Author of the publication

Security Analysis on an Improvement of RSA-Based Password Authenticated Key Exchange.

, , and . IEICE Transactions, 88-B (4): 1641-1646 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comments on yet another log-in authentication using n-dimensional construction., , and . IEEE Trans. Consumer Electronics, 50 (2): 606-608 (2004)Speech enhancement using generalized weighted β-order spectral amplitude estimator., , and . Speech Communication, (2014)Security Analysis on an Improvement of RSA-Based Password Authenticated Key Exchange., , and . IEICE Transactions, 88-B (4): 1641-1646 (2005)Efficient Proof of Validity of Votes in Homomorphic E-Voting., and . NSS, page 17-23. IEEE Computer Society, (2010)Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation., , , , and . AINA Workshops (1), page 385-391. IEEE Computer Society, (2007)Blind Joint Symbol Detection and DOA Estimation for OFDM System with Antenna Array., , and . Wireless Personal Communications, 46 (3): 371-383 (2008)A speech enhancement method by coupling speech detection and spectral amplitude estimation., , and . INTERSPEECH, page 3234-3238. ISCA, (2013)Codebook-based speech enhancement using Markov process and speech-presence probability., , and . INTERSPEECH, page 1780-1784. ISCA, (2015)Evaluating the importance of nodes in complex networks based on principal component analysis and grey relational analysis., , , and . ICON, page 231-235. IEEE, (2011)Introducing Decryption Authority into PKI.. ACSAC, page 288-. IEEE Computer Society, (2000)