Author of the publication

Security Improvement on A Three Party Password Based Authenticated Key Exchange Scheme Using Chaotic Maps.

, , , , and . J. Inf. Hiding Multim. Signal Process., 7 (6): 1365-1372 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Length Encoded Secondary Structure Profile for Remote Homologous Protein Detection., , , , , and . ICA3PP, volume 5574 of Lecture Notes in Computer Science, page 1-11. Springer, (2009)3DVPS: A 3D Point Cloud-Based Visual Positioning System., , , and . ICCE, page 1-4. IEEE, (2020)A novel fuzzy logic system based on N-version programming., and . IEEE Trans. Fuzzy Syst., 8 (2): 155-170 (2000)A secure authentication scheme for Internet of Things., , , and . Pervasive Mob. Comput., (2017)A Secure Authentication Protocol for Internet of Vehicles., , , and . IEEE Access, (2019)Analysis of Kelly betting on finite repeated games., , , and . Appl. Math. Comput., (2020)Selecting Hyper-Parameters of Gaussian Process Regression Based on Non-Inertial Particle Swarm Optimization in Internet of Things., , , , , and . IEEE Access, (2019)A network-DEA model with new efficiency measures to incorporate the dynamic effect in production networks.. Eur. J. Oper. Res., 194 (3): 687-699 (2009)Super efficiencies or super inefficiencies? Insights from a joint computation model for slacks-based measures in DEA.. Eur. J. Oper. Res., 226 (2): 258-267 (2013)Forward Privacy Analysis of a Dynamic Searchable Encryption Scheme., , , and . ICGEC, volume 1107 of Advances in Intelligent Systems and Computing, page 474-480. Springer, (2019)