Author of the publication

OSNP: Secure wireless authentication protocol using one-time key.

, , , and . Computers & Security, 28 (8): 803-815 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Generic Electronic Payment Model Supporting Multiple Merchant Transactions., , and . Computers & Security, 19 (5): 453-465 (2000)A graph approach to quantitative analysis of control-flow obfuscating transformations., , and . IEEE Trans. Information Forensics and Security, 4 (2): 257-267 (2009)A Performance Mapping Model for Physical-to-Virtual Migration., , and . SERE, page 90-98. IEEE, (2013)OSNP: Secure wireless authentication protocol using one-time key., , , and . Computers & Security, 28 (8): 803-815 (2009)An AHP-Based Risk Assessment for an Industrial IoT Cloud., and . QRS Companion, page 637-638. IEEE, (2018)Attacks against process control systems: risk assessment, detection, and response., , , , , and . AsiaCCS, page 355-366. ACM, (2011)Design methodology and hands-on practices for Embedded Operating Systems., and . ICPADS, page 1-6. IEEE Computer Society, (2007)Kannon: Ubiquitous Sensor/Actuator Technologies for Elderly Living and Care: A Multidisciplinary Effort in National Chiao Tung University, Taiwan., , , , , , , , , and 1 other author(s). SMC, page 4297-4303. IEEE, (2006)Security Impacts of Virtualization on a Network Testbed., , , and . SERE, page 71-77. IEEE, (2012)S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks., , and . IEEE Trans. Vehicular Technology, 60 (9): 4509-4519 (2011)