Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correction of trust region method with a new modified Newton method., , and . Int. J. Comput. Math., 97 (5): 1118-1132 (2020)An improvement of adaptive cubic regularization method for unconstrained optimization problems., , and . Int. J. Comput. Math., 98 (2): 271-287 (2021)Graph Representation Learning Towards Patents Network Analysis., and . CoRR, (2023)Analysis of Persian News Agencies on Instagram, A Words Co-occurrence Graph-based Approach., and . CoRR, (2024)Known unknowns: Indeterminacy in authentication in IoT., , , , and . Future Gener. Comput. Syst., (2020)Uncertainty-Aware Authentication Model for IoT., , , , , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 224-237. Springer, (2019)A Location-Aware Authentication Model to Handle Uncertainty in IoT., , , , , and . IoTSMS, page 43-50. IEEE, (2019)An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client-Client Networks., , , , and . Wirel. Pers. Commun., 88 (2): 337-356 (2016)A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security., , , , , and . Int. J. Commun. Syst., (2017)Uncertainty-Aware Authentication Model for Fog Computing in IoT., , , , , and . FMEC, page 52-59. IEEE, (2019)