Author of the publication

An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment.

, , , , , and . Int. J. Commun. Syst., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient forensic technique for exposing region duplication forgery in digital images., , , and . Appl. Intell., 48 (7): 1791-1801 (2018)An Improved Product Recommendation Method for Collaborative Filtering., , , , and . IEEE Access, (2020)Steganography-assisted secure localization of smart devices in internet of multimedia things (IoMT)., , , , , , and . Multim. Tools Appl., 80 (11): 17045-17065 (2021)A Machine-Learning-Based Approach for Autonomous IoT Security., , , , , and . IT Prof., 23 (3): 69-75 (2021)A 4-Stage Pipelined Architecture for Point Multiplication of Binary Huff Curves., , , and . J. Circuits Syst. Comput., 29 (11): 2050179:1-2050179:28 (2020)Single and multiple regions duplication detections in digital images with applications in image forensic., , , , , , , and . J. Intell. Fuzzy Syst., 40 (6): 10351-10371 (2021)K-means based multiple objects tracking with long-term occlusion handling., , , , and . IET Comput. Vis., 11 (1): 68-77 (2017)Saliency Based Object Detection and Enhancements in Static Images., , , , , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 114-123. Springer, (2017)Content-based image retrieval and semantic automatic image annotation based on the weighted average of triangular histograms using support vector machine., , and . Appl. Intell., 48 (1): 166-181 (2018)A Novel Optimized Semi-Blind Scheme for Color Image Watermarking., , and . IEEE Access, (2020)