| Publication | Date of Publication | Type |
|---|
| scientific article; zbMATH DE number 6499839 (Why is no real title available?) | 2015-10-28 | Paper |
| scientific article; zbMATH DE number 6499844 (Why is no real title available?) | 2015-10-28 | Paper |
| scientific article; zbMATH DE number 6159487 (Why is no real title available?) | 2013-04-30 | Paper |
Efficiency and security problems of anonymous key agreement protocol based on chaotic maps Communications in Nonlinear Science and Numerical Simulation | 2012-07-16 | Paper |
| An entire chaos-based biometric remote user authentication scheme on tokens without using password | 2011-11-17 | Paper |
An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map Communications in Nonlinear Science and Numerical Simulation | 2011-09-23 | Paper |
Robust biometric-based three-party authenticated key establishment protocols International Journal of Computer Mathematics | 2011-04-21 | Paper |
| scientific article; zbMATH DE number 5507095 (Why is no real title available?) | 2009-02-12 | Paper |
| scientific article; zbMATH DE number 5506913 (Why is no real title available?) | 2009-02-12 | Paper |
An Improved Popescu’s Authenticated Key Agreement Protocol Computational Science and Its Applications - ICCSA 2006 | 2009-02-12 | Paper |
One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity Computational Science and Its Applications - ICCSA 2006 | 2009-02-12 | Paper |
Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks Computational Science and Its Applications - ICCSA 2006 | 2009-01-27 | Paper |
Computational Science and Its Applications – ICCSA 2004 Lecture Notes in Computer Science | 2007-07-19 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
SOFSEM 2006: Theory and Practice of Computer Science Lecture Notes in Computer Science | 2006-11-14 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Computing and Combinatorics Lecture Notes in Computer Science | 2006-01-11 | Paper |
Weakness and solution of Yang et al.'s protected password changing scheme Applied Mathematics and Computation | 2005-11-16 | Paper |
On the security of Wu-Lin's robust key authentication scheme Applied Mathematics and Computation | 2005-11-16 | Paper |
Cryptanalysis of Zhang-Xiao's multisignature scheme for specified group of verifiers Applied Mathematics and Computation | 2005-11-14 | Paper |
Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme Applied Mathematics and Computation | 2005-11-04 | Paper |
Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm Applied Mathematics and Computation | 2005-10-28 | Paper |
Improvement of Chien--Jan's authenticated multiple-key agreement protocol without using conventional one-way function Applied Mathematics and Computation | 2005-10-28 | Paper |
| scientific article; zbMATH DE number 2202170 (Why is no real title available?) | 2005-09-05 | Paper |
Fixing problems in Lin et al.'s OSPA protocol Applied Mathematics and Computation | 2005-08-05 | Paper |