Author of the publication

A changeable personal identification number-based keystroke dynamics authentication system on smart phones.

, , , , and . Secur. Commun. Networks, 9 (15): 2674-2685 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Personalized Rhythm Click-Based Authentication System., , and . Inf. Manag. Comput. Secur., 18 (2): 72-85 (2010)Novel heterogeneous grouping method based on magic square., , , , and . Inf. Sci., (2020)Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines., , and . J. Inf. Sci. Eng., 18 (3): 373-379 (2002)An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks., , , , , , and . IEEE Access, (2023)A Conference Key Scheme Based on the Diffie-Hellman Key Exchange., , and . Int. J. Netw. Secur., 20 (6): 1221-1226 (2018)Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone., , , , and . J. Netw. Comput. Appl., (2015)User-anonymous and short-term Conference Key Distribution System via link-layer routing in mobile communications., and . Int. J. Mob. Commun., 9 (2): 144-158 (2011)A new approach to generate diversified clusters for small data sets., , , , and . Appl. Soft Comput., (2020)An Improved Multi-stage Secret Sharing Scheme Based on the Factorization Problem., , and . Inf. Technol. Control., 40 (3): 246-251 (2011)An ID-based multi-signer universal designated multi-verifier signature scheme.. Inf. Comput., 209 (7): 1007-1015 (2011)