Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Liou, Y. P., Jay Lin, and Shuenn-Shyang Wang. A New Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards In 16th Information Security Conference., 2006. Xie, Ji-Lin Wang Qi, De-Ren Chen, and Xiu-Yuan Yu. A novel user authentication scheme using smart cards In 2008 International Conference on Computer Science and Software Engineering 3., 2008. Khan, Muhammad Khurram, Soo-Kyun Kim, and Khaled Alghathbar. "Cryptanalysis and Security Enhancement of a “More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme”." Computer Communications 34, no. 3 (2011). Yeh, Kuo-Hui, Chunhua Su, Nai Wei Lo, Yingjiu Li, and Yi-Xiang Hung. "Two Robust Remote User Authentication Protocols Using Smart Cards." The Journal of Systems and Software 83, no. 12 (2010). Passing, Martin, and Falko Dressler. Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes In 3rd International Conference on Mobile Adhoc and Sensor Systems., 2006. Yoon, Eun-Jun, Ein-Jung Lee, and Kee-Young Yoo. Cryptanalysis of Wang et al.’s Remote User Authentication Scheme Using Smart Cards In 5th International Conference on Information Technology: New Generations., 2008. Sacco, Dorothy E. Denning. "Timestamps in Key Distribution System." Communications of the ACM 24, no. 8 (1981). Wang, Xiaofeng, and Michael K. Reiter. Defending Against Denial-of-Service Attacks with Puzzle Auctions In 2003 IEEE Symposium on Security and Privacy., 2003. Buchmann, Johannes. Introduction to Cryptography. Berlin: Springer-Verlag, 2001. Stinson, Douglas. Cryptography. Boca Raton: FL: CRC Press, 2006. Joux, Antoine. A One Round Protocol for Tripartite Diffie-Hellman In Algorithmic Number Theory Symposium, Lecture Notes in Computer Science. Vol. 1838., 2000. Boneh, Dan, and Matthew Franklin. Identity Based Encryption from the Weil Pairing In Lecture Notes in Computer Science ., 2001. Kim, Myungsun, and Kwangjo Kim. A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem In 7th Australian Conference on Information Security and Privacy, ACISP. Vol. 02., 2002. Smart, Nigel. "An Identity Based Authentication Key Agreement Protocol Based on Pairing." Electronics Letters 38 (2002). Wen, H. A., Tian-Fu Lee, and Tzonelih Hwang. "Provably Secure Three-party Password-based Authenticated Key Exchange Protocol Using Weil Pairing." IEE Proceedings Communication 152, no. 2 (2005). Fiat, Amos, and Adi Shamir. How to Prove Yourself: Practical Solutions of Identification and Signature Problems In Advances in Cryptology – Proceedings of CRYPTO’86, Lecture Notes in Computer Science. Vol. 263., 1987. Feige, Uriel, Amos Fiat, and Adi Shamir. "Zero-Knowledge Proofs of Identity." Journal of Cryptology 1 (1988). Schnorr, Claus-Peter. "Efficient Signature Generation by Smart Cards." Journal of Cryptology 4 (1991). Boneh, Dan, and Xavier Boyen. "Short Signatures without Random Oracles." In Cryptology – Eurocrypt 04, Lecture Notes in Computer Science., 2004. Shao, Jun, Rongxing Lu, and Zhenfu Cao. "A New Efficient Identification Scheme Based on the Strong Diffie-Hellman Assumption." In International Symposium on Future Software Technology., 2004. Yao, Gang, Guilin Wang, and Yong Wang. An Improved Identification Scheme In Progress in Computer Science and Applied Logic., 2003. Dehkordi, Massoud Hadian, and Reza Alimoradi. "A New Batch Identification Scheme." Discrete Mathematics, Algorithms and Applications 1, no. 3 (2009). Goldreich, Oded. Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Berlin: Springer-Verlag, 1999. S. Goldwasser, Micali, and C. Rackoff. "The Knowledge Complexity of Interactive Proof Systems." SIAM J. Comput. 18, no. 1 (1989): 186208. Ahmadi, Omran, Darrel Hankerson, and Alfred Menezes. Software Implementation of Arithmetic in F3m In Arithmetic of Finite Fields (WAIFI 2007), Lecture Notes in Computer Science 4547., 2007. Pages« първа ‹ предишна … 86 87 88 89 90 91 92 93 94 … следваща › последна »