Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Moskowitz, Ira, LiWu Chang, and Richard Newman. Capacity is the Wrong Paradigm In 2002 Workshop on New Security Paradigms., 2002. Argyroudis, Patroklos, Raja Verma, Hitesh Tewari, and Donal O’Mahoni. Performance Analysis of Cryptographic Protocols on Handhled Devices In 3rd International Symposium on Network Computing and Applications., 2004. Awasthi, Amit Kumar, and Sunder Lal. "A Remote User Authentication Scheme Using Smart Cards with Forward Secrecy." IEEE Transactions on Consumer Electronics 49, no. 4 (2003). Awasthi, Amit Kumar, and Sunder Lal. Security Analysis of a Dynamic I-Based Remote User Authentication Scheme., 2004. Bellare, Mihir, and Phillip Rogaway. "Entity Authentication and Key Distribution." In Advances in cryptology CRYPTO’93., 1993. Chien, Hung-Yu, and Che-Hao Chen. A Remote Authentication Scheme Preserving User Anonymity In Proceedings of 19th International Conference on Advanced Information Networking and Applications., 2005. Das, Manik Lal, Ashutosh Saxena, and V.P. Gulati. "A Dynamic ID-based Remote User Authentication Scheme." IEEE Transactions on Consumer Electronics 50, no. 2 (2004). Duan, Xiaoyi, JianWei Liu, and Qishan Zhang. "Security Improvement on Chien Et al.’s Remote User Authentication Scheme Using Smart Cards." In The 2006 IEEE International Conference on Computational Intelligence and Security (CIS 2006) 2., 2006. Gao, Zhengxian, and Yaqing Tu. An Improvement of Dynamic ID-Based Remote User Authentication Scheme with Smart Card In Proceedings of the 7th World Congress on Intelligent Control and Automation., 2008. Gong, Li. "A Security Risk of Depending on Synchronized Clocks." ACM SIGOPS Operating Systems Review 26, no. 1 (1992). Hsiang, Han-Cheng, and Wei-Kuan Shih. "Weaknesses and Improvements of the Yoon-Ryu-Yoo Remote User Authentication Scheme Using Smart Cards." Computer Communications 32, no. 4 (2008). Hwang, Tzonelih, Yihwa Chen, and Chi Sung Laih. "Non-Interactive Password Authentication without Password Tables." In EEE 10th Regional Conference on Computer and Communication Systems., 1990. Kocher, Paul, Joshua Jaffe, and Bejamin Jun. Differential Power Analysis In Proceedings of Advances in Cryptology: CRYPTO’99., 1999. Ku, Wei-Chi, and Shen-Tien Chang. "Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards." IEICE Transactions on communications E88, no. B(5) (2005). Lee, Cheng-Chi, Min-Shiang Hwang, and Wei-Peng Yang. "A Flexible Remote User Authentication Scheme with Smart Cards." ACM Operating System Review 36, no. 3 (2002): 46-52. Liao, I-En, Cheng-Chi Lee, and Min-Shiang Hwang. Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme In International Conference on Next Generation Web Services Practices., 2005. Lo, Nai Wei, and Kuo-Hui Yeh. "Cryptanalysis of Two Three-Party Encrypted Key Exchange Protocols." Computer Standards & Interfaces 31, no. 6 (2009). Messerges, Thomas, Ezzat Dabbish, and Robert Sloan. "Examining Smart-Card Security Under the Threat of Power Analysis Attacks." IEEE Transactions on Computers 51, no. 5 (2002). Wang, Yan-Yan, Jia-Yong Liu, Feng-Xia Xiao, and Jing Dan. "A More Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme." Computer Communication 32, no. 4 (2009). Yeh, Kuo-Hui, Nai Wei Lo, and Enrico Winata. "Cryptanalysis of an Efficient Remote User Authentication Scheme with Smart Cards." International Journal of Innovative Computing, Information and Control 6, no. 6 (2010). Yoon, Eun-Jun, Eun-Kung Ryu, and Kee-Young Yoo. "Further Improvement of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards." IEEE Transactions on Consumer Electronics 50, no. 2 (2004). Zhang, Xin, Quan Yuan Feng, and Miao Li. A Modified Dynamic ID-Based Remote User Authentication Scheme In International Conference on Communications, Circuits and Systems., 2006. Awasthi, Amit Kumar. "Comment on a dynamic ID-based remote user authentication scheme." Transaction on Cryptology 1, no. 2 (2004). Yoon, Eun-Jun, and Kee Young Yoo. Improving the Dynamic ID-Based Remote Mutual Authentication Scheme In On the Move to Meaningful Internet Systems 2006, OTM 2006 Workshops., 2006. Shih, Hsi-Chang. Cryptanalysis on Two Password Authentication Schemes In Laboratory of Cryptography and Information Security. Vol. Master's Thesis. Taiwan: National Central University, 2008. Pages« първа ‹ предишна … 85 86 87 88 89 90 91 92 93 … следваща › последна »