Author of the publication

An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme.

, , , , , , and . Wireless Personal Communications, 95 (3): 3185-3208 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling Iteration's Perspectives in Software Engineering., , , , , and . IEEE Access, (2022)The Effect of Fake Reviews on e-Commerce During and After Covid-19 Pandemic: SKL-Based Fake Reviews Detection., , , and . IEEE Access, (2022)An Interpretation of Long Short-Term Memory Recurrent Neural Network for Approximating Roots of Polynomials., , , , and . IEEE Access, (2022)Performance and Power Efficient Massive Parallel Computational Model for HPC Heterogeneous Exascale Systems., , , and . IEEE Access, (2018)The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field., , , , , and . IEEE Access, (2022)An Advanced Dummy Position-Based Privacy Provisioning Framework for TTP-Based LBS System., and . IEEE Access, (2024)Solution of Combined Economic Emission Dispatch Problem Using Improved and Chaotic Population-Based Polar Bear Optimization Algorithm., , , , , , and . IEEE Access, (2021)Fisher score and Matthews correlation coefficient-based feature subset selection for heart disease diagnosis using support vector machines., , , , , , and . Knowl. Inf. Syst., 58 (1): 139-167 (2019)Iteration Causes, Impact, and Timing in Software Development Lifecycle: An SLR., , , , , and . IEEE Access, (2022)Classification and Prediction of Significant Cyber Incidents (SCI) Using Data Mining and Machine Learning (DM-ML)., , , , , , and . IEEE Access, (2023)