Author of the publication

Cryptanalysis of a robust smart card authentication scheme for multi-server architecture.

, , , , and . ISBAST, page 120-123. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing and classifying risk of pipeline third-party interference based on fault tree and SOM., , , , and . Eng. Appl. of AI, 25 (3): 594-608 (2012)Study on co-occurrence character networks from Chinese essays in different periods., , , and . SCIENCE CHINA Information Sciences, 55 (11): 2417-2427 (2012)Security performance analysis of an M-code keying OCDMA system., , , , and . Photonic Network Communications, 15 (1): 19-24 (2008)Discriminative human action recognition in the learned hierarchical manifold space., , , , and . Image Vision Comput., 28 (5): 836-849 (2010)A study of hotspot data prediction model in I/O workloads., , , , , and . Int. J. Comput. Math., 91 (3): 403-433 (2014)JPEG image steganalysis using joint discrete cosine transform domain features., , , , and . J. Electronic Imaging, 19 (2): 023006 (2010)PCA & HMM Based Arm Gesture Recognition Using Inertial Measurement Unit., , , , and . BODYNETS, page 193-196. ICST, (2013)On the Accurate Identification of Familiar Inter-Domain Routing Instabilities., , , and . GLOBECOM, page 1556-1561. IEEE, (2008)Unveiling the resource consumption overhead of virtual machine consolidation in data centers., , , and . GLOBECOM, page 3262-3267. IEEE, (2012)A dynamic security association control scheme for efficient authentication in wireless networks., and . GLOBECOM, page 3778-3782. IEEE, (2004)