Author of the publication

Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment.

, , , , , and . IEEE Internet Things J., 4 (5): 1634-1646 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Characterizations of Proper Interval Bigraphs and Proper Circular Arc Bigraphs., and . CALDAM, volume 8959 of Lecture Notes in Computer Science, page 117-125. Springer, (2015)An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System., and . J. Medical Systems, 37 (5): 9969 (2013)A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography., , , and . IEEE Access, (2016)Analysis of Security Protocols for Mobile Healthcare., , , and . J. Medical Systems, 40 (11): 229:1-229:10 (2016)A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems.. J. Medical Systems, 39 (3): 30 (2015)Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions., , and . IEEE Consumer Electronics Magazine, 8 (2): 56-60 (2019)Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks., , and . SSCC, volume 377 of Communications in Computer and Information Science, page 243-254. Springer, (2013)Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks.. SSCC, volume 467 of Communications in Computer and Information Science, page 1-9. Springer, (2014)Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks., , and . SSCC, volume 467 of Communications in Computer and Information Science, page 10-19. Springer, (2014)An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems., , and . Wireless Personal Communications, 84 (4): 2571-2598 (2015)