Author of the publication

Security Analysis on an Improvement of RSA-Based Password Authenticated Key Exchange.

, , and . IEICE Transactions, 88-B (4): 1641-1646 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Environment-biased technological progress and industrial land-use efficiency in China's new normal., , and . Annals OR, 268 (1-2): 425-440 (2018)A new hardware-assisted PIR with O(n) shuffle cost., , , and . Int. J. Inf. Sec., 9 (4): 237-252 (2010)New Results on Unconditionally Secure Multi-receiver Manual Authentication., and . ICITS, volume 4883 of Lecture Notes in Computer Science, page 115-132. Springer, (2007)Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords., , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 414-425. Springer, (2004)Cryptanalysis of Two Password-Authenticated Key Exchange Protocols., and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 164-175. Springer, (2004)A Multiple-Bits Watermark for Relational Data., , and . J. Database Manag., 19 (3): 1-21 (2008)The Effect of Role Ambiguity on Task Performance Through Self-Efficacy - A Contingency Perspective., and . IEEE Trans. Engineering Management, 61 (4): 681-689 (2014)Bargmann and Neumann System of the Second-Order Matrix Eigenvalue Problem., , , , and . JCP, 7 (9): 2216-2223 (2012)Nonlinear Evolution Equations for Second-order Spectral Problem., , and . JCP, 7 (9): 2144-2151 (2012)The Multireceiver Commitment Schemes.. IACR Cryptology ePrint Archive, (2008)