Author of the publication

Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.

, , , and . Wireless Personal Communications, 94 (3): 1281-1296 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward a secure batch verification with group testing for VANET., and . Wireless Networks, 19 (6): 1441-1449 (2013)Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks., and . Comput. J., 58 (4): 934-943 (2015)A Robust Remote User Authentication Scheme against Smart Card Security Breach., , , and . DBSec, volume 6818 of Lecture Notes in Computer Science, page 231-238. Springer, (2011)A Batch Verification for Multiple Proxy Signature., , and . Parallel Process. Lett., 21 (1): 77-84 (2011)A dynamic identity-based user authentication scheme for remote login systems., , and . Secur. Commun. Networks, 8 (18): 3372-3382 (2015)A n2+n MQV key agreement protocol., , and . Int. Arab J. Inf. Technol., 10 (2): 137-142 (2013)A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps., , , , and . Soft Comput., 22 (8): 2495-2506 (2018)Security enhancement on an RFID ownership transfer protocol based on cloud., , , , and . Future Gener. Comput. Syst., (2019)A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem., , and . Int. J. Found. Comput. Sci., 20 (2): 351-359 (2009)Time-bound key-aggregate encryption for cloud storage., , , and . Secur. Commun. Networks, 9 (13): 2059-2069 (2016)