Author of the publication

A Key Establishment Scheme for Large-Scale Mobile Wireless Sensor Networks.

, and . ICDCIT, volume 4882 of Lecture Notes in Computer Science, page 79-88. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks., , and . SSCC, volume 377 of Communications in Computer and Information Science, page 243-254. Springer, (2013)Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks.. SSCC, volume 467 of Communications in Computer and Information Science, page 1-9. Springer, (2014)Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks., , and . SSCC, volume 467 of Communications in Computer and Information Science, page 10-19. Springer, (2014)An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems., , and . Wireless Personal Communications, 84 (4): 2571-2598 (2015)A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks., , , and . Wireless Personal Communications, 94 (3): 1899-1933 (2017)Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks., , , , , and . IEEE Internet of Things Journal, 5 (1): 269-282 (2018)A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography., , , and . IEEE Access, (2016)Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions., , and . IEEE Consumer Electronics Magazine, 8 (2): 56-60 (2019)Analysis of Security Protocols for Mobile Healthcare., , , and . J. Medical Systems, 40 (11): 229:1-229:10 (2016)A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems.. J. Medical Systems, 39 (3): 30 (2015)