Author of the publication

A Secure Authentication Scheme for Session Initiation Protocol Based on Elliptic Curve Cryptography.

, , , and . CIT/IUCC/DASC/PICom, page 1960-1965. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sustainable development challenges in libraries: A systematic literature review (2000--2020), , and . The Journal of Academic Librarianship, 47 (3): 102347 (2021)Going green libraries; Sustainable development challenges; Sustainable development libraries; Sustainable literature reviews.The changing role of librarians in the digital world: Adoption of Web 2.0 technologies by Pakistani librarians., and . Electron. Libr., 30 (4): 469-479 (2012)Competencies needed for future academic librarians in Pakistan.. Educ. Inf., 20 (1): 27-43 (2002)Protein Folding Database (PFD 2.0): an online environment for the International Foldeomics Consortium., , , , , and . Nucleic Acids Res., 35 (Database-Issue): 304-307 (2007)An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF., , , , , , and . Internet Things, (July 2023)Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF., , , , , and . IEEE Trans. Veh. Technol., 70 (11): 12158-12167 (2021)An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems., , , , and . Multim. Tools Appl., 76 (12): 14225-14245 (2017)Modified Red Fox Optimizer With Deep Learning Enabled False Data Injection Attack Detection., , , , , and . IEEE Access, (2023)A Provably Secure Lightweight Key Agreement Protocol for Wireless Body Area Networks in Healthcare System., , , , , and . IEEE Trans. Ind. Informatics, 19 (2): 1683-1690 (2023)Content authentication and tampering detection of Arabic text: an approach based on zero-watermarking and natural language processing., , , , , and . Pattern Anal. Appl., 25 (1): 47-62 (2022)