Author of the publication

A survey on MITM and its countermeasures in the TLS handshake protocol.

, , , , and . ICUFN, page 724-729. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage., , , and . IEEE Trans. Cloud Comput., 10 (2): 1008-1020 (2022)Asymptotically Optimal and Secure Multiwriter/Multireader Similarity Search., and . IEEE Access, (2022)Secure deduplication with reliable and revocable key management in fog computing., , , and . Peer-to-Peer Netw. Appl., 12 (4): 850-864 (2019)Secure Device-to-Device Authentication in Mobile Multi-hop Networks., , , , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 267-278. Springer, (2014)Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea., , , and . WISA, volume 11897 of Lecture Notes in Computer Science, page 357-369. Springer, (2019)A Privacy Threat in 4th Generation Mobile Telephony and Its Countermeasure., , , , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 624-635. Springer, (2014)Trustworthy Delegation Toward Securing Mobile Healthcare Cyber-Physical Systems., , and . IEEE Internet Things J., 6 (4): 6301-6309 (2019)Order-Hiding Range Query Over Encrypted Cloud Data., , and . IEEE Access, (2022)A secure OTP algorithm using a smartphone application., , and . ICUFN, page 476-481. IEEE, (2015)Secure deduplication for multimedia data with user revocation in cloud storage., , , and . Multim. Tools Appl., 76 (4): 5889-5903 (2017)