Author of the publication

Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures.

, , , and . IEEE Trans. Inf. Forensics Secur., 11 (9): 2052-2064 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy inference to supplier evaluation and selection based on quality index: a flexible approach., , and . Neural Comput. Appl., 23 (Supplement-1): 117-127 (2013)Evaluation of the Reliability of Emergency Networks under Time Constraints., and . CASE, page 259-263. IEEE, (2006)Design of a coherent inverse synthetic aperture radar moving target simulator., , , , and . IEICE Electron. Express, 11 (24): 20141044 (2014)An ultra-high ramp rate arbitrary waveform generator for communication and radar applications., , , , , and . IEICE Electron. Express, 12 (3): 20141163 (2015)Evaluation of the reliability of transport networks based on the stochastic flow of moving objects., , and . Reliab. Eng. Syst. Saf., 93 (6): 838-844 (2008)Subspace Clustering Under Complex Noise., , , , and . IEEE Trans. Circuits Syst. Video Techn., 29 (4): 930-940 (2019)Image Enlargement Using Multiple Sensors., , , and . J. Sensors, (2016)Robust Frame Registration for Multiple Camera Setups in Dynamic Scenes., , , and . ICTAI, page 373-380. IEEE Computer Society, (2012)Event-triggered feedback control for discrete-time piecewise-affine systems., , and . Int. J. Systems Science, 49 (16): 3377-3389 (2018)Research on Secure Multicast Technology in Grid-Based Large-Scale Distributed Simulation Applications., , , and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 538-545. Springer, (2004)