Author of the publication

Anonymous two-factor authentication for consumer roaming service in global mobility networks.

, , , and . IEEE Trans. Consumer Electron., 59 (4): 811-817 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications., , , , , , and . IEEE Access, (2017)Deep Learning-Based Image Kernel for Inductive Transfer., , , and . CoRR, (2015)Ensuring Privacy and Security in E- Health Records., , , , , , and . CITS, page 1-5. IEEE, (2018)Possible Electromagnetic Hypersensitivity among Cellular Phone Users in Relevance to Self Reported Subjective Symptoms and Sensations and Adopted Safety Measures. Health Informatics - An International Journal (HIIJ), 01 (01): 09-17 (August 2012)LOADS: Load Optimization and Anomaly Detection Scheme for Software-Defined Networks., and . IEEE Trans. Vehicular Technology, 68 (12): 12329-12344 (2019)Mobile cloud networking for efficient energy management in smart grid cyber-physical systems., , and . IEEE Wirel. Commun., 23 (5): 100-108 (2016)A systematic review on routing protocols for Vehicular Ad Hoc Networks., , and . Veh. Commun., 1 (1): 33-52 (2014)Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment., , , , and . IEEE Trans. Dependable Secur. Comput., 17 (2): 391-406 (2020)Computing a Minimum Color Path in Edge-Colored Graphs.. SEA², volume 11544 of Lecture Notes in Computer Science, page 35-50. Springer, (2019)Exploring Cell counting with Neural Arithmetic Logic Units., , , , and . CoRR, (2020)