Sciweavers

72 search results - page 1 / 15
» Reply to Rao et al. and Lee et al
Sort
View
IJNSEC
2008
155views more  IJNSEC 2008»
13 years 4 months ago
Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme
Recently, Das, Saxena and Gulati proposed a dynamic Id based remote user authentication scheme that allows the users to choose and change their passwords freely and does not maint...
Mohammed Misbahuddin, C. Shoba Bindu
AMC
2005
124views more  AMC 2005»
13 years 4 months ago
The security of a strong proxy signature scheme with proxy signer privacy protection
In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In 2001, Lee et al. const...
Narn-Yih Lee, Ming-Feng Lee
TCS
2010
13 years 3 months ago
A comprehensive analysis of degree based condition for Hamiltonian cycles
— Rahman and Kaykobad introduced a shortest distance based condition for finding the existence of Hamiltonian paths in graphs as follows: Let G be a connected graph with n vertic...
Md. Kamrul Hasan, Mohammad Kaykobad, Young-Koo Lee...