Author of the publication

A secure user authentication protocol for sensor network in data capturing.

, , , and . J. Cloud Comput., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Energy Efficiency Trusted Dynamic Routing Protocol for Wireless Sensor Networks., , , , and . EIDWT, page 329-334. IEEE Computer Society, (2013)Radar Detection Based on Fuzzy Hypotheses with Fuzzy Data., , and . J. Networks, 9 (9): 2309-2318 (2014)Segmentation and Tracking of Neural Stem Cell., and . ICIC (2), volume 3645 of Lecture Notes in Computer Science, page 851-859. Springer, (2005)Multi-Recipient encryption with keyword search without pairing for cloud storage., , , and . J. Cloud Comput., (2022)PSSC: Practical and Secure Sidechain Construction for Heterogeneous Blockchains Orienting IoT., , , , and . IEEE Internet Things J., 11 (3): 4600-4613 (February 2024)Efficient pairing-free PRE schemes for multimedia data sharing in IoT., , , and . Multim. Tools Appl., 77 (14): 18327-18354 (2018)A multi-step doubly stabilized bundle method for nonsmooth convex optimization., , , and . Appl. Math. Comput., (2020)Two infinite classes of rotation symmetric bent functions with simple representation., , , and . Appl. Algebra Eng. Commun. Comput., 29 (3): 197-208 (2018)On the Menezes-Teske-Weng conjecture., , , and . Cryptogr. Commun., 12 (1): 19-27 (2020)Combinatorial t-designs from special functions., and . Cryptogr. Commun., 12 (5): 1011-1033 (2020)