Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security of a Certificateless Public Key Encryption with Keyword Search., , , , and . IIH-MSP (1), volume 81 of Smart Innovation, Systems and Technologies, page 191-197. Springer, (2017)Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme., , , , and . IIH-MSP (1), volume 109 of Smart Innovation, Systems and Technologies, page 178-183. Springer, (2018)SPATE: Small-Group PKI-Less Authenticated Trust Establishment., , , , , , , , , and 3 other author(s). IEEE Trans. Mob. Comput., 9 (12): 1666-1681 (2010)On the Security of Chien's Ultralightweight RFID Authentication Protocol., , and . IEEE Trans. Dependable Secur. Comput., 8 (2): 315-317 (2011)Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol., , , , , and . J. Inf. Sci. Eng., 34 (2): 371-390 (2018)On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags., , , and . J. Supercomput., 74 (1): 65-70 (2018)On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme., , and . IEEE Trans. Dependable Secur. Comput., 6 (2): 159-160 (2009)A Public Auditing Scheme with Data Recovery., , , , and . ICGEC, volume 834 of Advances in Intelligent Systems and Computing, page 595-602. Springer, (2018)A secure authenticated and key exchange scheme for fog computing., , , , and . Enterp. Inf. Syst., 15 (9): 1200-1215 (2021)A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices., , , , and . IEEE Trans. Inf. Forensics Secur., 8 (8): 1318-1330 (2013)