From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function., , и . SSCC, том 377 из Communications in Computer and Information Science, стр. 236-242. Springer, (2013)New characterizations of proper interval bigraphs., и . AKCE Int. J. Graphs Comb., 12 (1): 47-53 (2015)Design of a secure smart card-based multi-server authentication scheme., , , и . J. Inf. Secur. Appl., (2016)A New Biometric-Based Remote User Authentication Scheme in Hierarchical Wireless Body Area Sensor Networks., , и . Ad Hoc Sens. Wirel. Networks, 28 (3-4): 221-256 (2015)An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function., , и . Int. J. Commun. Networks Distributed Syst., 12 (2): 129-151 (2014)On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment., , , , , и . IEEE Trans. Vehicular Technology, 69 (5): 5535-5548 (2020)A hybrid ensemble machine learning model for detecting APT attacks based on network behavior anomaly detection., , , и . Concurr. Comput. Pract. Exp., (2023)iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment., , , , и . IEEE Access, (2021)Securing Age-of-Information (AoI)-Enabled 5G Smart Warehouse Using Access Control Scheme., , , и . IEEE Internet Things J., 10 (2): 1358-1375 (января 2023)An Efficient Privacy-Preserving Authenticated Key Establishment Protocol for Health Monitoring in Industrial Cyber-Physical Systems., , , , , , и . IEEE Internet Things J., 9 (7): 5142-5149 (2022)