From post

Cryptanalysis and Improvement of ECC - Based Security Enhanced User Authentication Protocol for Wireless Sensor Networks.

, , и . SSCC, том 536 из Communications in Computer and Information Science, стр. 134-145. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improving straggler task performance in a heterogeneous MapReduce framework using reinforcement learning., , и . Int. J. Big Data Intell., 5 (4): 201-215 (2018)Recurrent neural network and a hybrid model for prediction of stock returns., , и . Expert Syst. Appl., 42 (6): 3234-3241 (2015)User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem., и . SSCC, том 746 из Communications in Computer and Information Science, стр. 79-94. Springer, (2017)A Cross - Domain Role Mapping and Authorization Framework for RBAC in Grid Systems., , и . Int. J. Comput. Sci. Appl., 6 (1): 1-12 (2009)Blockchain-based Cloud Data Deduplication Scheme with Fair Incentives., , и . CoRR, (2023)Secure mobile payment framework based on UICC with formal verification., , и . Int. J. Comput. Sci. Eng., 9 (4): 355-370 (2014)Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption., , и . Int. J. Inf. Secur. Priv., 6 (2): 64-94 (2012)MCMARS: Hybrid Multi-criteria Decision-Making Algorithm for Recommender Systems of Mobile Applications., , и . ICDCIT, том 13776 из Lecture Notes in Computer Science, стр. 107-124. Springer, (2023)Location-based associativity routing for MANET., и . WiMob (3), стр. 49-56. IEEE, (2005)0-7803-9181-0.User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition., и . SSCC, том 746 из Communications in Computer and Information Science, стр. 39-53. Springer, (2017)