Author of the publication

A three-factor anonymous user authentication scheme for Internet of Things environments.

, , , , , and . J. Inf. Secur. Appl., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment., and . ICCSA (2), volume 5593 of Lecture Notes in Computer Science, page 164-172. Springer, (2009)Factors affecting continuous purchase intention of fashion products on social E-commerce: SOR model and the mediating effect., and . Entertain. Comput., (2022)Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction., , and . IJDSN, 12 (1): 8572410:1-8572410:16 (2016)Secure Deletion for Flash-Based Self-Encrypting Drives., , , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 559-566. Springer, (2015)Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks., , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 7-13. Springer, (2015)Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device., , , and . ITCS, volume 180 of Lecture Notes in Electrical Engineering, page 241-247. Springer, (2012)Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting., , , and . KES-AMSTA, volume 4496 of Lecture Notes in Computer Science, page 616-625. Springer, (2007)Cryptanalysis of Chaos-Based 2-Party Key Agreement Protocol with Provable Security., , , , and . AHFE (9), volume 593 of Advances in Intelligent Systems and Computing, page 72-77. Springer, (2017)Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group., , , , and . HCI (11), volume 6771 of Lecture Notes in Computer Science, page 339-348. Springer, (2011)Cryptanalysis to a Remote User Authentication Scheme Using Smart Cards for Multi-server Environment., , and . HCI (11), volume 6771 of Lecture Notes in Computer Science, page 321-329. Springer, (2011)