Author of the publication

A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques.

, , and . IJDSN, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Data-Driven Approach for Multi-level Packing Problems in Manufacturing Industry., , , , and . KDD, page 1762-1770. ACM, (2019)CoinMagic: A Differential Privacy Framework for Ring Signature Schemes., , , , , , , and . CoRR, (2020)A Novel Game-Theory-Based Analysis Approach for Running a Supply Chain Project., , and . ICIC (2), volume 4114 of Lecture Notes in Computer Science, page 1014-1019. Springer, (2006)A Novel Approach for Vendor Combination Selection in Supply Chain Management., , and . Australian Conference on Artificial Intelligence, volume 3809 of Lecture Notes in Computer Science, page 1331-1334. Springer, (2005)Reconstruction of the biomechanical transfer path of femoral head necrosis: A subject-specific finite element investigation., , , , , , and . Comput. Biol. Medicine, (2014)A linear-time algorithm for paired-domination problem in strongly chordal graphs., , and . Inf. Process. Lett., 110 (1): 20-23 (2009)K-Hop Community Search Based on Local Distance Dynamics., , , , and . ICONIP (5), volume 10638 of Lecture Notes in Computer Science, page 24-34. Springer, (2017)Predicting triplet of transcription factor - mediating enzyme - target gene by functional profiles., , , and . Neurocomputing, 74 (17): 3677-3681 (2011)Curse of Dimensionality.. Encyclopedia of Database Systems, Springer US, (2009)Fluid: A Blockchain based Framework for Crowdsourcing., , , and . SIGMOD Conference, page 1921-1924. ACM, (2019)