Author of the publication

Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing.

, , , , and . Peer-to-Peer Netw. Appl., 12 (4): 924-933 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generation Scheduling of a Hydrothermal System Considering Multiple Provincial Peak-Shaving Demands., , , , and . IEEE Access, (2019)Secure data uploading scheme for a smart home system., , , , , and . Inf. Sci., (2018)Trip mode recognition using smartphone sensor data under different sampling frequencies., , , and . Web Intell., 17 (2): 151-160 (2019)A Four-Stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Coverage., , and . SpaCCS, volume 11342 of Lecture Notes in Computer Science, page 178-191. Springer, (2018)Buffer scheme optimization of epidemic routing in delay tolerant networks., , , and . J. Commun. Networks, 16 (6): 656-666 (2014)A penalized method of alternating projections for weighted low-rank hankel matrix optimization., , , and . Math. Program. Comput., 14 (3): 417-450 (2022)Compression Sensing Signal Detection Algorithm Based on Orthogonal Matching Pursuit., , , and . Int. J. Wirel. Inf. Networks, 27 (2): 271-279 (2020)An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems., , , , , and . J. Ambient Intell. Humaniz. Comput., 7 (3): 427-443 (2016)The Motion Controller Based on Neural Network S-Plane Model for Fixed-Wing UAVs., , , , and . IEEE Access, (2021)Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage., , , , and . IEEE Access, (2019)