Author of the publication

Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks.

, , , , and . Inf. Technol. Control., 45 (1): 62-70 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques., , and . IJDSN, (2015)A two-factor authenticated key exchange protocol based on RSA with dynamic passwords., , , and . Int. J. Embed. Syst., 7 (3/4): 257-265 (2015)User centric three-factor authentication protocol for cloud-assisted wearable devices., , , , , and . Int. J. Commun. Syst., (2019)Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage., , , , and . Comput. Electr. Eng., (2016)A Risk Analysis Framework for Social Engineering Attack Based on User Profiling., , , , , and . J. Organ. End User Comput., 32 (3): 37-49 (2020)Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms., , and . Secur. Commun. Networks, (2021)VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel., , , , , and . Peer-to-Peer Netw. Appl., 10 (4): 995-1007 (2017)Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairings., , and . ICICA (LNCS), volume 6377 of Lecture Notes in Computer Science, page 135-142. Springer, (2010)Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting., , and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 255-267. Springer, (2010)Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks., , , , and . Wirel. Commun. Mob. Comput., (2018)