Author of the publication

Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation.

, , , and . Security and Communication Networks, 8 (18): 3356-3371 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Locality-Constrained Collaborative Sparse Approximation for Multiple-Shot Person Re-identification., , and . ACPR, page 140-144. IEEE, (2013)Approximation of Circular Arcs by C2 Cubic Polynomial B-splines., and . CAD/Graphics, page 417-420. IEEE, (2007)Can feature-based inductive transfer learning help person re-identification?, , , and . ICIP, page 2812-2816. IEEE, (2013)An Improved Network Intrusion Detection Method based on VQ-SVM., , and . IASTED PDCS, page 583-587. IASTED/ACTA Press, (2005)Practical Quantum No-key Protocol with Identification., and . IAS, page 540-543. IEEE Computer Society, (2009)Pedestrian detection using background subtraction assisted Support Vector Machine., , , and . ISDA, page 837-842. IEEE, (2011)Zeno: Diagnosing Performance Problems with Temporal Provenance., , and . NSDI, page 395-420. USENIX Association, (2019)False Data Attacks Judgment Based on Consistency Loop Model in Wireless Sensor Networks., , , , , and . ICSI (2), volume 7929 of Lecture Notes in Computer Science, page 308-315. Springer, (2013)A Load Balancing Strategy in Web Cluster System., , and . ICNC (4), page 809-813. IEEE Computer Society, (2007)Based on Multi-features and Clustering Ensemble Method for Automatic Malware Categorization., , , , , and . TrustCom/BigDataSE/ICESS, page 73-82. IEEE Computer Society, (2017)