Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed K-Distance Indexing Approach for Efficient Shortest Path Discovery on Large Graphs., , , , , and . DASFAA Workshops, volume 8505 of Lecture Notes in Computer Science, page 75-88. Springer, (2014)Secure user authentication scheme with novel server mutual verification for multiserver environments., , and . Int. J. Commun. Syst., (2019)A Secure Batch Authentication Scheme for Multiaccess Edge Computing in 5G-Enabled Intelligent Transportation System., , , , , , and . IEEE Access, (2022)SALS-TMIS: Secure, Anonymous, and Lightweight Privacy-Preserving Scheme for IoMT-Enabled TMIS Environments., and . IEEE Access, (2022)A Secure Charging System for Electric Vehicles Based on Blockchain., , , , , , and . Sensors, 19 (13): 3028 (2019)BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments., , , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1719-1729 (March 2023)Topological Similarity-Based Feature Selection for Graph Classification., , , , and . Comput. J., 58 (9): 1884-1893 (2015)Security analysis and enhancements of an improved multi-factor biometric authentication scheme., , , , and . Int. J. Distributed Sens. Networks, (2017)A Secure Authentication and Key Establishment Scheme for Wearable Devices., , , , , and . ICCCN, page 1-2. IEEE, (2019)A Secure Multi-Factor Remote User Authentication Scheme for Cloud-IoT Applications., , , , and . ICCCN, page 1-2. IEEE, (2019)