Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Khan, Muhammad Khurram
,
Soo-Kyun Kim
, and
Khaled Alghathbar
.
"
Cryptanalysis and Security Enhancement of a “More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme”
."
Computer Communications
34, no. 3 (2011).
Yeh, Kuo-Hui
,
Chunhua Su
,
Nai Wei Lo
,
Yingjiu Li
, and
Yi-Xiang Hung
.
"
Two Robust Remote User Authentication Protocols Using Smart Cards
."
The Journal of Systems and Software
83, no. 12 (2010).
Passing, Martin
, and
Falko Dressler
.
Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes
In
3rd International Conference on Mobile Adhoc and Sensor Systems
., 2006.
Yoon, Eun-Jun
,
Ein-Jung Lee
, and
Kee-Young Yoo
.
Cryptanalysis of Wang et al.’s Remote User Authentication Scheme Using Smart Cards
In
5th International Conference on Information Technology: New Generations
., 2008.
Sacco, Dorothy E. Denning
.
"
Timestamps in Key Distribution System
."
Communications of the ACM
24, no. 8 (1981).
Wang, Xiaofeng
, and
Michael K. Reiter
.
Defending Against Denial-of-Service Attacks with Puzzle Auctions
In
2003 IEEE Symposium on Security and Privacy
., 2003.
Buchmann, Johannes
.
Introduction to Cryptography
. Berlin: Springer-Verlag, 2001.
Stinson, Douglas
.
Cryptography
. Boca Raton: FL: CRC Press, 2006.
Joux, Antoine
.
A One Round Protocol for Tripartite Diffie-Hellman
In
Algorithmic Number Theory Symposium, Lecture Notes in Computer Science
. Vol. 1838., 2000.
Boneh, Dan
, and
Matthew Franklin
.
Identity Based Encryption from the Weil Pairing
In
Lecture Notes in Computer Science
., 2001.
Kim, Myungsun
, and
Kwangjo Kim
.
A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem
In
7th Australian Conference on Information Security and Privacy, ACISP
. Vol. 02., 2002.
Smart, Nigel
.
"
An Identity Based Authentication Key Agreement Protocol Based on Pairing
."
Electronics Letters
38 (2002).
Wen, H. A.
,
Tian-Fu Lee
, and
Tzonelih Hwang
.
"
Provably Secure Three-party Password-based Authenticated Key Exchange Protocol Using Weil Pairing
."
IEE Proceedings Communication
152, no. 2 (2005).
Fiat, Amos
, and
Adi Shamir
.
How to Prove Yourself: Practical Solutions of Identification and Signature Problems
In
Advances in Cryptology – Proceedings of CRYPTO’86, Lecture Notes in Computer Science
. Vol. 263., 1987.
Feige, Uriel
,
Amos Fiat
, and
Adi Shamir
.
"
Zero-Knowledge Proofs of Identity
."
Journal of Cryptology
1 (1988).
Schnorr, Claus-Peter
.
"
Efficient Signature Generation by Smart Cards
."
Journal of Cryptology
4 (1991).
Boneh, Dan
, and
Xavier Boyen
.
"
Short Signatures without Random Oracles
." In
Cryptology – Eurocrypt 04, Lecture Notes in Computer Science
., 2004.
Shao, Jun
,
Rongxing Lu
, and
Zhenfu Cao
.
"
A New Efficient Identification Scheme Based on the Strong Diffie-Hellman Assumption
." In
International Symposium on Future Software Technology
., 2004.
Yao, Gang
,
Guilin Wang
, and
Yong Wang
.
An Improved Identification Scheme
In
Progress in Computer Science and Applied Logic
., 2003.
Dehkordi, Massoud Hadian
, and
Reza Alimoradi
.
"
A New Batch Identification Scheme
."
Discrete Mathematics, Algorithms and Applications
1, no. 3 (2009).
Goldreich, Oded
.
Modern Cryptography, Probabilistic Proofs and Pseudorandomness
. Berlin: Springer-Verlag, 1999.
S. Goldwasser, Micali
, and
C. Rackoff
.
"
The Knowledge Complexity of Interactive Proof Systems
."
SIAM J. Comput.
18, no. 1 (1989): 186208.
Ahmadi, Omran
,
Darrel Hankerson
, and
Alfred Menezes
.
Software Implementation of Arithmetic in F3m
In
Arithmetic of Finite Fields (WAIFI 2007), Lecture Notes in Computer Science 4547
., 2007.
Avanzi, Roberto
, and
Nicolas Theriault
.
"
Effects of Optimizations for Software Implementations of Small Binary Field Arithmetic
."
Lecture Notes in Computer Science, Arithmetic of Finite Fields (WAIFI 2007)
4547 (2007).
Galbraith, Steven
,
Keith Harrison
, and
David Soldera
.
"
Implementing the Tate pairing
."
Algorithmic Number Theory, Lecture Note in Computer Science
2369 (2002).
Pages
« първа
‹ предишна
…
86
87
88
89
90
91
92
93
94
…
следваща ›
последна »
382269 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all