7

A secure broadcasting cryptosystem and its application to grid computing

Year:
2011
Language:
english
File:
PDF, 860 KB
english, 2011
8

Fixing problems in Lin et al.’s OSPA protocol

Year:
2005
Language:
english
File:
PDF, 310 KB
english, 2005
12

On the security of Wu-Lin’s robust key authentication scheme

Year:
2005
Language:
english
File:
PDF, 100 KB
english, 2005
13

Weakness and solution of Yang et al.’s protected password changing scheme

Year:
2005
Language:
english
File:
PDF, 153 KB
english, 2005
16

An improvement of Hwang–Lee–Tang's simple remote user authentication scheme

Year:
2005
Language:
english
File:
PDF, 134 KB
english, 2005
17

Cryptanalysis of a modulo image encryption scheme with fractal keys

Year:
2010
Language:
english
File:
PDF, 1.60 MB
english, 2010
18

Robust Deniable Authentication Protocol

Year:
2010
Language:
english
File:
PDF, 351 KB
english, 2010
21

Improving the novel three-party encrypted key exchange protocol

Year:
2008
Language:
english
File:
PDF, 504 KB
english, 2008
22

Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard

Year:
2012
Language:
english
File:
PDF, 536 KB
english, 2012
26

Cryptanalysis of an Efficient Secret Handshakes Scheme with Unlinkability

Year:
2011
Language:
english
File:
PDF, 624 KB
english, 2011
28

Cryptanalysis of an e_cient three-party password-based key exchange scheme

Year:
2012
Language:
english
File:
PDF, 212 KB
english, 2012
35

Verifier-based computation-and communication-efficient 3EKE protocols

Year:
2013
Language:
english
File:
PDF, 506 KB
english, 2013