Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
(active tab)
Full profile
Publications
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Shih, Hsi-Chang
.
Cryptanalysis on Two Password Authentication Schemes
In
Laboratory of Cryptography and Information Security
. Vol. Master's Thesis. Taiwan: National Central University, 2008.
Liou, Y. P.
,
Jay Lin
, and
Shuenn-Shyang Wang
.
A New Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards
In
16th Information Security Conference
., 2006.
Xie, Ji-Lin Wang Qi
,
De-Ren Chen
, and
Xiu-Yuan Yu
.
A novel user authentication scheme using smart cards
In
2008 International Conference on Computer Science and Software Engineering 3
., 2008.
Khan, Muhammad Khurram
,
Soo-Kyun Kim
, and
Khaled Alghathbar
.
"
Cryptanalysis and Security Enhancement of a “More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme”
."
Computer Communications
34, no. 3 (2011).
Yeh, Kuo-Hui
,
Chunhua Su
,
Nai Wei Lo
,
Yingjiu Li
, and
Yi-Xiang Hung
.
"
Two Robust Remote User Authentication Protocols Using Smart Cards
."
The Journal of Systems and Software
83, no. 12 (2010).
Passing, Martin
, and
Falko Dressler
.
Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes
In
3rd International Conference on Mobile Adhoc and Sensor Systems
., 2006.
Yoon, Eun-Jun
,
Ein-Jung Lee
, and
Kee-Young Yoo
.
Cryptanalysis of Wang et al.’s Remote User Authentication Scheme Using Smart Cards
In
5th International Conference on Information Technology: New Generations
., 2008.
Sacco, Dorothy E. Denning
.
"
Timestamps in Key Distribution System
."
Communications of the ACM
24, no. 8 (1981).
Wang, Xiaofeng
, and
Michael K. Reiter
.
Defending Against Denial-of-Service Attacks with Puzzle Auctions
In
2003 IEEE Symposium on Security and Privacy
., 2003.
Buchmann, Johannes
.
Introduction to Cryptography
. Berlin: Springer-Verlag, 2001.
Stinson, Douglas
.
Cryptography
(link is external)
. Boca Raton: FL: CRC Press, 2006.
Joux, Antoine
.
A One Round Protocol for Tripartite Diffie-Hellman
In
Algorithmic Number Theory Symposium, Lecture Notes in Computer Science
. Vol. 1838., 2000.
Boneh, Dan
, and
Matthew Franklin
.
Identity Based Encryption from the Weil Pairing
In
Lecture Notes in Computer Science
., 2001.
Kim, Myungsun
, and
Kwangjo Kim
.
A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem
In
7th Australian Conference on Information Security and Privacy, ACISP
. Vol. 02., 2002.
Smart, Nigel
.
"
An Identity Based Authentication Key Agreement Protocol Based on Pairing
."
Electronics Letters
38 (2002).
Wen, H. A.
,
Tian-Fu Lee
, and
Tzonelih Hwang
.
"
Provably Secure Three-party Password-based Authenticated Key Exchange Protocol Using Weil Pairing
."
IEE Proceedings Communication
152, no. 2 (2005).
Fiat, Amos
, and
Adi Shamir
.
How to Prove Yourself: Practical Solutions of Identification and Signature Problems
In
Advances in Cryptology – Proceedings of CRYPTO’86, Lecture Notes in Computer Science
. Vol. 263., 1987.
Feige, Uriel
,
Amos Fiat
, and
Adi Shamir
.
"
Zero-Knowledge Proofs of Identity
."
Journal of Cryptology
1 (1988).
Schnorr, Claus-Peter
.
"
Efficient Signature Generation by Smart Cards
."
Journal of Cryptology
4 (1991).
Boneh, Dan
, and
Xavier Boyen
.
"
Short Signatures without Random Oracles
." In
Cryptology – Eurocrypt 04, Lecture Notes in Computer Science
., 2004.
Shao, Jun
,
Rongxing Lu
, and
Zhenfu Cao
.
"
A New Efficient Identification Scheme Based on the Strong Diffie-Hellman Assumption
(link is external)
." In
International Symposium on Future Software Technology
., 2004.
Yao, Gang
,
Guilin Wang
, and
Yong Wang
.
An Improved Identification Scheme
In
Progress in Computer Science and Applied Logic
., 2003.
Dehkordi, Massoud Hadian
, and
Reza Alimoradi
.
"
A New Batch Identification Scheme
."
Discrete Mathematics, Algorithms and Applications
1, no. 3 (2009).
Goldreich, Oded
.
Modern Cryptography, Probabilistic Proofs and Pseudorandomness
. Berlin: Springer-Verlag, 1999.
S. Goldwasser, Micali
, and
C. Rackoff
.
"
The Knowledge Complexity of Interactive Proof Systems
."
SIAM J. Comput.
18, no. 1 (1989): 186208.
Pages
« първа
‹ предишна
…
86
87
88
89
90
91
92
93
94
…
следваща ›
последна »
502586 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance
Back to top