Author of the publication

Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment.

, , , , , and . IEEE Internet Things J., 4 (5): 1634-1646 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rate-Compatible Punctured Polar Codes: Optimal Construction Based on Polar Spectra., , , , , and . CoRR, (2016)Estimating Graph Robustness Through the Randic Index., , , , and . IEEE Trans. Cybern., 48 (11): 3232-3242 (2018)A Social-Aware Virtual MAC Protocol for Energy-Efficient D2D Communications Underlying Heterogeneous Cellular Networks., , , and . IEEE Trans. Veh. Technol., 67 (9): 8372-8385 (2018)Noncooperative and Cooperative Optimization of Electric Vehicle Charging Under Demand Uncertainty: A Robust Stackelberg Game., , and . IEEE Trans. Veh. Technol., 65 (3): 1043-1058 (2016)Special Issue on Multimedia Computing and Management in Cloud Environment., and . Concurr. Comput. Pract. Exp., 24 (17): 2081-2082 (2012)On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC., , , , , and . Int. J. Commun. Syst., (2018)Dynamic group optimization algorithm with a mean-variance search framework., , , , , and . Expert Syst. Appl., (2021)An effective service-oriented networking management architecture for 5G-enabled internet of things., , , , and . Comput. Networks, (2020)Provably secure three-party authenticated key agreement protocol using smart cards., , , , , and . Comput. Networks, (2014)On the effectiveness of service differentiation based resource-provision incentive mechanisms in dynamic and autonomous P2P networks., , , and . Comput. Networks, 55 (17): 3811-3831 (2011)