Author of the publication

An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client-Client Networks.

, , , , and . Wirel. Pers. Commun., 88 (2): 337-356 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of ResearchGate, A Community Detection Approach., and . CoRR, (2020)Uncertainty-Aware Authentication Model for Fog Computing in IoT., , , , , and . FMEC, page 52-59. IEEE, (2019)A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security., , , , , and . Int. J. Commun. Syst., (2017)An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client-Client Networks., , , , and . Wirel. Pers. Commun., 88 (2): 337-356 (2016)An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks., , , , and . Inf. Technol. Control., 44 (4): 387-403 (2015)An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems., , , , and . Multim. Tools Appl., 76 (12): 14225-14245 (2017)Uncertainty-Aware Authentication Model for IoT., , , , , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 224-237. Springer, (2019)A Location-Aware Authentication Model to Handle Uncertainty in IoT., , , , , and . IoTSMS, page 43-50. IEEE, (2019)Correction of trust region method with a new modified Newton method., , and . Int. J. Comput. Math., 97 (5): 1118-1132 (2020)Known unknowns: Indeterminacy in authentication in IoT., , , , and . Future Gener. Comput. Syst., (2020)