Author of the publication

Private Authentication Techniques for the Global Mobility Network.

, , and . Wireless Personal Communications, 35 (4): 329-336 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems., , and . J. Medical Systems, 39 (5): 58 (2015)User authentication scheme with anonymity, unlinkability and untrackability for global mobility networks.. Secur. Commun. Networks, 6 (11): 1404-1413 (2013)Efficient three-party encrypted key exchange using trapdoor functions., , and . Secur. Commun. Networks, 6 (11): 1353-1358 (2013)Efficient Extended Chaotic Map-Based IBE for Industrial Environment., and . IEEE Access, (2022)An Efficient Chaotic Maps-Based Authentication and Key Agreement Scheme Using Smartcards for Telecare Medicine Information Systems.. J. Medical Systems, 37 (6): 9985 (2013)Communication-efficient three-party protocols for authentication and key agreement., , , , and . Comput. Math. Appl., 58 (4): 641-648 (2009)Efficient Signature Scheme Using Extended Chaotic Maps for Medical Imaging Records., , and . ICMHI, page 118-121. ACM, (2020)Enhanced three-party encrypted key exchange without server public keys., , and . Comput. Secur., 23 (7): 571-577 (2004)A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting., , , and . Sensors, 17 (12): 2793 (2017)Simple Group Password-based Authenticated Key Agreements for the Integrated EPR Information System., , and . J. Medical Systems, 37 (2): 9916 (2013)