Author of the publication

Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography.

, , , and . Comput. Networks, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds., , , , and . Future Gener. Comput. Syst., (2018)Improved one-to-many authentication scheme for access control in pay-TV systems., and . IET Inf. Secur., 6 (4): 281-290 (2012)Provable Data Possession with Outsourced Data Transfer., , , , and . IEEE Trans. Serv. Comput., 14 (6): 1929-1939 (2021)Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography., , , and . Comput. Networks, (2017)Blockchain-based multi-party proof of assets with privacy preservation., , , and . Inf. Sci., (2021)Proxy Provable Data Possession with General Access Structure in Public Clouds., and . Inscrypt, volume 9589 of Lecture Notes in Computer Science, page 283-300. Springer, (2015)VFL: A Verifiable Federated Learning With Privacy-Preserving for Big Data in Industrial IoT., , , , , and . IEEE Trans. Ind. Informatics, 18 (5): 3316-3326 (2022)Privacy-Preserving Federated Learning in Fog Computing., , , , , and . IEEE Internet Things J., 7 (11): 10782-10793 (2020)Blockchain-Based Privacy-Preserving and Rewarding Private Data Sharing for IoT., , , and . IEEE Internet Things J., 9 (16): 15138-15149 (2022)Cloud-Assisted EHR Sharing With Security and Privacy Preservation via Consortium Blockchain., , , and . IEEE Access, (2019)