Author of the publication

A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System.

, , , , and . IEEE Access, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Mining of High Average-Utility Itemsets with Multiple Thresholds., , and . IIH-MSP (1), volume 81 of Smart Innovation, Systems and Technologies, page 198-205. Springer, (2017)Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol., , , , , and . J. Inf. Sci. Eng., 34 (2): 371-390 (2018)A New Certificate-Based Aggregate Signature Scheme for Wireless Sensor Networks., , , and . J. Inf. Hiding Multim. Signal Process., 9 (5): 1264-1280 (2018)A Parse Tree-Based NoSQL Injection Attacks Detection Mechanism., , , , and . J. Inf. Hiding Multim. Signal Process., 8 (4): 916-928 (2017)Transfer learning model for false positive reduction in lymph node detection via sparse coding and deep learning., , and . J. Intell. Fuzzy Syst., 43 (2): 2121-2133 (2022)SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing., , , , and . Symmetry, 14 (7): 1393 (2022)A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps., , and . IEEE Access, (2018)Multilayer Dense Attention Model for Image Caption., , , , and . IEEE Access, (2019)On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags., , , and . J. Supercomput., 74 (1): 65-70 (2018)Cryptanalysis of Än Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System"., , , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 282-289. Springer, (2017)