Author of the publication

An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices.

, , , , and . Wirel. Commun. Mob. Comput., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved LDA Dimension Reduction Based Behavior Learning with Commodity WiFi for Cyber-Physical Systems., , , , and . ACM Trans. Cyber Phys. Syst., 3 (4): 38:1-38:19 (2019)RF-IDH: An intelligent fall detection system for hemodialysis patients via COTS RFID., , , and . Future Gener. Comput. Syst., (2020)Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain., , , , and . ISPRS Int. J. Geo Inf., 6 (6): 163 (2017)A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption., , , and . J. Cloud Comput., 13 (1): 44 (December 2024)Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare System., , , , and . IEEE Trans. Ind. Informatics, 13 (3): 1227-1237 (2017)Entropy landscape of solutions in the binary perceptron problem, , and . CoRR, (2013)Statistical mechanics of continual learning: variational principle and mean-field potential., , , and . CoRR, (2022)Dynamic Idle Time Interval Scheduling for Hybrid Cloud Workflow Management System., , , , and . SMC, page 3596-3602. IEEE, (2018)An Adaptive Heuristic for Scheduling Dynamic and Fuzzy Jobs on Elastic Clouds., , and . CBD, page 7-12. IEEE, (2019)Statistical physics of unsupervised learning with prior knowledge in neural networks., and . CoRR, (2019)