A Study on Smart Deployment for Real-Time Strategy Games. | 0 | 0.34 | 2016 |
Mobile user authentication system in cloud environment. | 0 | 0.34 | 2013 |
Secure proxy signature schemes from the Weil pairing | 1 | 0.37 | 2013 |
Password-based authentication and key distribution protocols with perfect forward secrecy | 7 | 0.86 | 2006 |
Improvement Of An Efficient And Practical Solution To Remote Authentication: Smard Card | 2 | 0.51 | 2006 |
Password authenticated key exchange protocols among diverse network domains | 9 | 0.66 | 2005 |
On the design of time-stamped signatures | 3 | 0.55 | 2004 |
Password-based user authentication and key distribution protocols for client-server applications | 9 | 0.51 | 2004 |
Security of park-lim key agreement schemes for vsat satellite communications | 3 | 0.43 | 2003 |
On the Linkability of Some Group Signature Schemes | 0 | 0.34 | 2003 |
Efficient Three-Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks | 21 | 0.92 | 2003 |
Simple authenticated key agreement protocol resistant to password guessing attacks | 13 | 1.02 | 2002 |
Security analysis of the generalized key agreement and password authentication protocol | 10 | 0.77 | 2001 |