Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient three-factor user authentication scheme for industrial wireless sensor network with fog computing., , and . Int. J. Commun. Syst., (2022)An Improved and Secure Two-factor Dynamic ID Based Authenticated Key Agreement Scheme for Multiserver Environment., , and . Wirel. Pers. Commun., 101 (3): 1307-1333 (2018)Chaotic Map based Privacy Preservation User Authentication Scheme for WBANs., and . TENCON, page 1037-1042. IEEE, (2019)A Convertible Designated Verifible Blind Multi-signcryption Scheme., , and . ACC (4), volume 193 of Communications in Computer and Information Science, page 549-556. Springer, (2011)Design of electronic payment system based on authenticated key exchange., , and . Electron. Commer. Res., 18 (2): 359-388 (2018)CL-AGKA: certificateless authenticated group key agreement protocol for mobile networks., , and . Wirel. Networks, 26 (4): 3011-3031 (2020)A Light Weight Three Factor based Authentication Scheme for Multi-server Environment using Smart Cards., , and . ICCNS, page 43-47. ACM, (2017)CLB-ECC: Certificateless Blind Signature Using ECC., , and . J. Inf. Process. Syst., 13 (4): 970-986 (2017)BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications., , , , , and . Comput., 5 (4): 32 (2016)A secure three factor based authentication scheme for health care systems using IoT enabled devices., , and . J. Ambient Intell. Humaniz. Comput., 12 (1): 1419-1434 (2021)