Author of the publication

An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol.

, , , and . SIN, page 145-149. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data hiding using edge detector for scalable images., and . Multimedia Tools Appl., 71 (3): 1455-1468 (2014)An improved double image digital watermarking scheme using the position property., and . Multimedia Tools Appl., 74 (17): 7261-7283 (2015)Space-Efficient First Race Detection in Shared Memory Programs with Nested Parallelism., , and . PARA, volume 2367 of Lecture Notes in Computer Science, page 253-263. Springer, (2002)Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA., , , and . International Conference on Computational Science (4), volume 3994 of Lecture Notes in Computer Science, page 661-668. Springer, (2006)An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings., , and . ISPA, volume 4742 of Lecture Notes in Computer Science, page 446-456. Springer, (2007)Bit-serial AB2 Multiplier Using Modified Inner Product., , , and . J. Inf. Sci. Eng., 18 (4): 507-518 (2002)A Forgery Attack on A Low Computation Cost User Authentication Scheme., and . Int. J. Netw. Secur., 3 (1): 51-53 (2006)On the Security of Signature Scheme with Message Recovery and Its Application., and . Int. J. Netw. Secur., 3 (2): 151-154 (2006)Reversible data hiding scheme with edge-direction predictor and modulo operation., , , and . J. Real-Time Image Processing, 14 (1): 137-145 (2018)Pipelined Systolic Multiplier for Finite Fields GF (2m)., , , and . PDPTA, page 1224-1229. CSREA Press, (1999)