Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment., , , , and . IEEE Access, (2017)A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment., , , , and . J. Ambient Intell. Humaniz. Comput., 10 (2): 661-680 (2019)A Penalty-Based Entropy Driven Universal Password Strength for Lightweight Devices., , , , , , , and . COMSNETS, page 25-30. IEEE, (2024)A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography., , , and . IEEE Access, (2016)Provably Secure Pseudo-Identity Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Lightweight Mobile Devices., , , , and . IEEE Access, (2022)Graphical passwords: Behind the attainment of goals., , , , , and . Secur. Priv., (2020)Socio-cyber network: The potential of cyber-physical system to define human behaviors using big data analytics., , , , , , , and . Future Gener. Comput. Syst., (2019)E-Brightpass: A Secure way to access social networks on smartphones., , , , , , , and . Cyber Secur. Appl., (2024)Lightweight authentication with key-agreement protocol for mobile network environment using smart cards., , , and . IET Inf. Secur., 10 (5): 272-282 (2016)On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC., , , , , and . Int. J. Commun. Syst., (2018)