Author of the publication

Fast Remote User Authentication Scheme with Smart Card Based on Quadratic Residue.

, , , and . JDIM, 9 (2): 51-54 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Group commitment protocol based on zero knowledge proofs., and . Computer Communications, 18 (9): 654-656 (1995)Two ID-based multisignature protocols for sequential and broadcasting architectures., , and . Computer Communications, 19 (9-10): 851-856 (1996)Improvements of generalization of threshold signature and authenticated encryption for group communications., , and . Inf. Process. Lett., 81 (1): 41-45 (2002)Threshold signature scheme using self-certified public keys., and . Journal of Systems and Software, 67 (2): 89-97 (2003)Efficient proxy signcryption scheme with provable CCA and CMA security., , , and . Computers & Mathematics with Applications, 60 (7): 1850-1858 (2010)Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers., and . Computer Standards & Interfaces, 26 (5): 477-481 (2004)New proxy multi-signature scheme., , and . Applied Mathematics and Computation, 162 (3): 1201-1206 (2005)Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy., and . Computers & Security, 22 (5): 453-456 (2003)Efficient english auction scheme without a secure channel., , , and . Int. Arab J. Inf. Technol., 12 (3): 246-252 (2015)Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System., , and . TIIS, 8 (3): 1157-1177 (2014)