Author of the publication

Secure session between an IoT device and a cloud server based on elliptic curve cryptosystem.

, , , , and . Int. J. Inf. Comput. Secur., 15 (1): 67-87 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images., , and . IEEE Trans. Circuits Syst. Video Techn., 19 (6): 900-905 (2009)Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique., , , and . Digit. Signal Process., (2015)Design of electronic t-out-of-n lotteries on the Internet., and . Comput. Stand. Interfaces, 31 (2): 395-400 (2009)Secure communications for cluster-based ad hoc networks using node identities., and . J. Netw. Comput. Appl., 30 (4): 1377-1396 (2007)Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks., , , and . IEEE Access, (2020)A Secure Multicast Framework in Large and High-Mobility Network Groups., and . IEICE Trans. Commun., 92-B (7): 2365-2373 (2009)Security design for three-party encrypted key exchange protocol using smart cards., , and . ICUIMC, page 329-333. ACM, (2008)A wide-adapted bantam protocol for roaming across wireless areas., and . Wireless Networks, 19 (6): 1423-1440 (2013)Medical blockchain: Data sharing and privacy preserving of EHR based on smart contract., , , , and . J. Inf. Secur. Appl., (2022)Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity., , , and . KSII Trans. Internet Inf. Syst., 10 (12): 5616-5642 (2016)