Author of the publication

Secure Authentication Scheme with Improved Anonymity for Wireless Environments.

, and . IEICE Trans. Commun., 94-B (2): 554-557 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vehicle Path Tracking Control Using Pure Pursuit With MPC-Based Look-Ahead Distance Optimization., , , and . IEEE Trans. Veh. Technol., 73 (1): 53-66 (January 2024)Automated Generation of Test Cases for Smart Contract Security Analyzers., and . IEEE Access, (2020)Estimation of Tire Load and Vehicle Parameters Using Intelligent Tires Combined With Vehicle Dynamics., , , , , and . IEEE Trans. Instrum. Meas., (2021)Integrated Control of Steering and Braking for Path Tracking Using Multi-Point Linearized MPC., and . IEEE Trans. Intell. Veh., 8 (5): 3324-3335 (May 2023)Improved yoking proof protocols for preserving anonymity., , and . Int. J. Inf. Sec., 17 (4): 379-393 (2018)FlexiCast: Energy-Efficient Software Integrity Checks to Build Secure Industrial Wireless Active Sensor Networks., , and . IEEE Trans. Ind. Informatics, 12 (1): 6-14 (2016)Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks., , , and . UIC, volume 4611 of Lecture Notes in Computer Science, page 653-662. Springer, (2007)An enhanced TCP for upward vertical handoff in integrated WLAN and cellular networks., , and . Int. J. Commun. Syst., 21 (9): 901-921 (2008)Load Estimation of Intelligent Tires Equipped with Acceleration Sensors., , , and . SAS, page 1-5. IEEE, (2019)On the Privacy-Preserving HCI Issues., , and . HCI (5), volume 5614 of Lecture Notes in Computer Science, page 544-549. Springer, (2009)