Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Xie, Ji-Lin Wang Qi
,
De-Ren Chen
, and
Xiu-Yuan Yu
.
A novel user authentication scheme using smart cards
In
2008 International Conference on Computer Science and Software Engineering 3
., 2008.
Khan, Muhammad Khurram
,
Soo-Kyun Kim
, and
Khaled Alghathbar
.
"
Cryptanalysis and Security Enhancement of a “More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme”
."
Computer Communications
34, no. 3 (2011).
Yeh, Kuo-Hui
,
Chunhua Su
,
Nai Wei Lo
,
Yingjiu Li
, and
Yi-Xiang Hung
.
"
Two Robust Remote User Authentication Protocols Using Smart Cards
."
The Journal of Systems and Software
83, no. 12 (2010).
Passing, Martin
, and
Falko Dressler
.
Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes
In
3rd International Conference on Mobile Adhoc and Sensor Systems
., 2006.
Yoon, Eun-Jun
,
Ein-Jung Lee
, and
Kee-Young Yoo
.
Cryptanalysis of Wang et al.’s Remote User Authentication Scheme Using Smart Cards
In
5th International Conference on Information Technology: New Generations
., 2008.
Sacco, Dorothy E. Denning
.
"
Timestamps in Key Distribution System
."
Communications of the ACM
24, no. 8 (1981).
Wang, Xiaofeng
, and
Michael K. Reiter
.
Defending Against Denial-of-Service Attacks with Puzzle Auctions
In
2003 IEEE Symposium on Security and Privacy
., 2003.
Buchmann, Johannes
.
Introduction to Cryptography
. Berlin: Springer-Verlag, 2001.
Stinson, Douglas
.
Cryptography
. Boca Raton: FL: CRC Press, 2006.
Joux, Antoine
.
A One Round Protocol for Tripartite Diffie-Hellman
In
Algorithmic Number Theory Symposium, Lecture Notes in Computer Science
. Vol. 1838., 2000.
Boneh, Dan
, and
Matthew Franklin
.
Identity Based Encryption from the Weil Pairing
In
Lecture Notes in Computer Science
., 2001.
Kim, Myungsun
, and
Kwangjo Kim
.
A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem
In
7th Australian Conference on Information Security and Privacy, ACISP
. Vol. 02., 2002.
Smart, Nigel
.
"
An Identity Based Authentication Key Agreement Protocol Based on Pairing
."
Electronics Letters
38 (2002).
Wen, H. A.
,
Tian-Fu Lee
, and
Tzonelih Hwang
.
"
Provably Secure Three-party Password-based Authenticated Key Exchange Protocol Using Weil Pairing
."
IEE Proceedings Communication
152, no. 2 (2005).
Fiat, Amos
, and
Adi Shamir
.
How to Prove Yourself: Practical Solutions of Identification and Signature Problems
In
Advances in Cryptology – Proceedings of CRYPTO’86, Lecture Notes in Computer Science
. Vol. 263., 1987.
Feige, Uriel
,
Amos Fiat
, and
Adi Shamir
.
"
Zero-Knowledge Proofs of Identity
."
Journal of Cryptology
1 (1988).
Schnorr, Claus-Peter
.
"
Efficient Signature Generation by Smart Cards
."
Journal of Cryptology
4 (1991).
Boneh, Dan
, and
Xavier Boyen
.
"
Short Signatures without Random Oracles
." In
Cryptology – Eurocrypt 04, Lecture Notes in Computer Science
., 2004.
Shao, Jun
,
Rongxing Lu
, and
Zhenfu Cao
.
"
A New Efficient Identification Scheme Based on the Strong Diffie-Hellman Assumption
." In
International Symposium on Future Software Technology
., 2004.
Yao, Gang
,
Guilin Wang
, and
Yong Wang
.
An Improved Identification Scheme
In
Progress in Computer Science and Applied Logic
., 2003.
Dehkordi, Massoud Hadian
, and
Reza Alimoradi
.
"
A New Batch Identification Scheme
."
Discrete Mathematics, Algorithms and Applications
1, no. 3 (2009).
Goldreich, Oded
.
Modern Cryptography, Probabilistic Proofs and Pseudorandomness
. Berlin: Springer-Verlag, 1999.
S. Goldwasser, Micali
, and
C. Rackoff
.
"
The Knowledge Complexity of Interactive Proof Systems
."
SIAM J. Comput.
18, no. 1 (1989): 186208.
Ahmadi, Omran
,
Darrel Hankerson
, and
Alfred Menezes
.
Software Implementation of Arithmetic in F3m
In
Arithmetic of Finite Fields (WAIFI 2007), Lecture Notes in Computer Science 4547
., 2007.
Avanzi, Roberto
, and
Nicolas Theriault
.
"
Effects of Optimizations for Software Implementations of Small Binary Field Arithmetic
."
Lecture Notes in Computer Science, Arithmetic of Finite Fields (WAIFI 2007)
4547 (2007).
Pages
« първа
‹ предишна
…
86
87
88
89
90
91
92
93
94
…
следваща ›
последна »
469520 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all