Author of the publication

Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks.

, , and . GPC, volume 7861 of Lecture Notes in Computer Science, page 752-760. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment., and . ICCSA (2), volume 5593 of Lecture Notes in Computer Science, page 164-172. Springer, (2009)Secure Deletion for Flash-Based Self-Encrypting Drives., , , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 559-566. Springer, (2015)Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks., , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 7-13. Springer, (2015)Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction., , and . IJDSN, 12 (1): 8572410:1-8572410:16 (2016)Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device., , , and . ITCS, volume 180 of Lecture Notes in Electrical Engineering, page 241-247. Springer, (2012)Factors affecting continuous purchase intention of fashion products on social E-commerce: SOR model and the mediating effect., and . Entertain. Comput., (2022)Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting., , , and . KES-AMSTA, volume 4496 of Lecture Notes in Computer Science, page 616-625. Springer, (2007)Cryptanalysis of Chaos-Based 2-Party Key Agreement Protocol with Provable Security., , , , and . AHFE (9), volume 593 of Advances in Intelligent Systems and Computing, page 72-77. Springer, (2017)Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity., , , and . ITCS, volume 180 of Lecture Notes in Electrical Engineering, page 225-231. Springer, (2012)Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity., , , , and . Secur. Commun. Networks, (2018)