Author of the publication

Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation.

, , , and . Security and Communication Networks, 8 (18): 3356-3371 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bifurcation and Erosion of Safe Basin for a Spur Gear System., , and . I. J. Bifurcation and Chaos, 28 (14): 1830048 (2018)Think-Aloud Verbalizations for Identifying User Experience Problems: Effects of Language Proficiency with Chinese Non-Native English Speakers., and . CCHI, page 22-32. ACM, (2021)Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation., , , and . Security and Communication Networks, 8 (18): 3356-3371 (2015)SMSS: Symmetric-Masquerade Security Scheme for VANETs., , , and . ISADS, page 617-622. IEEE Computer Society, (2011)Think-Aloud Verbalizations for Identifying User Experience Problems: Effects of Language Proficiency with Chinese Non-Native English Speakers., and . CoRR, (2022)Dynamic Crowd Emotion Contagion Simulation with GPU Acceleration., , , and . CW, page 175-178. IEEE Computer Society, (2016)LIVE: a manually curated encyclopedia of experimentally validated interactions of lncRNAs., , , , , , , and . Database, (2019)Multi-dimensional Regression for Colour Prediction in Pad Dyeing., , , , , and . ICCCS (1), volume 11063 of Lecture Notes in Computer Science, page 675-687. Springer, (2018)An Adaptive Clustering Approach Based on Minimum Travel Route Planning for Wireless Sensor Networks with a Mobile Sink., , , , and . Sensors, 17 (5): 964 (2017)