Author of the publication

Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing.

, and . SUTC (1), page 520-529. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ECC-based lightweight authentication protocol with untraceability for low-cost RFID., and . J. Parallel Distrib. Comput., 69 (10): 848-853 (2009)Extended optimal age-replacement policy with minimal repair of a system subject to shocks., and . European Journal of Operational Research, 174 (1): 169-181 (2006)Optimal burn-in time to minimize the cost for general repairable products sold under warranty., and . European Journal of Operational Research, 163 (2): 445-461 (2005)Optimal Age-Replacement Policy Under an Imperfect Renewing Free-Replacement Warranty.. IEEE Trans. Reliability, 57 (1): 125-133 (2008)ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks., , and . IEEE Trans. Vehicular Technology, 60 (1): 248-262 (2011)The Use of Dynamic Display to Improve Reading Comprehension for the Small Screen of a Wrist Watch., and . HCI (8), volume 4557 of Lecture Notes in Computer Science, page 814-823. Springer, (2007)Security of ultra-lightweight RFID authentication protocols and its improvements., and . Operating Systems Review, 41 (4): 83-86 (2007)Improved Anonymous Multi-receiver Identity-Based Encryption.. Comput. J., 55 (4): 439-446 (2012)A new warranty strategy: Combining a renewing free-replacement warranty with a rebate policy.. Quality and Reliability Eng. Int., 24 (7): 807-815 (2008)Two RFID-based Solutions to Enhance Inpatient Medication Safety., , , and . J. Medical Systems, 35 (3): 369-375 (2011)