Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks., , , , , and . IEEE Journal on Selected Areas in Communications, 23 (11): 2182-2193 (2005)Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols., , and . IEICE Transactions, 93-A (11): 2092-2095 (2010)Efficient Augmented Password-Only Authentication and Key Exchange for IKEv2., and . RFC, (June 2012)A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol., , and . IACR Cryptology ePrint Archive, (2008)Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA"., , and . IACR Cryptology ePrint Archive, (2005)A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size., , and . ICN (2), volume 3421 of Lecture Notes in Computer Science, page 944-952. Springer, (2005)Leakage-Resilient Authenticated Key Establishment Protocols., , and . ASIACRYPT, volume 2894 of Lecture Notes in Computer Science, page 155-172. Springer, (2003)A New Security Architecture for Personal Networks and Its Performance Evaluation., , , , and . IEICE Transactions, 91-B (7): 2255-2264 (2008)Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems., , , and . Wireless Personal Communications, 54 (1): 225-236 (2010)A security framework for personal networks., , and . COMSWARE, page 682-690. IEEE, (2008)