Author of the publication

A secure authentication scheme with provable correctness for pay-TV systems.

, , and . Secur. Commun. Networks, 9 (11): 1577-1588 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Smart Card Based Authentication Scheme Using Image Encryption., , , and . J. Inf. Sci. Eng., 29 (6): 1135-1150 (2013)A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems., and . J. Inf. Hiding Multim. Signal Process., 6 (2): 288-296 (2015)Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data., , , and . Secur. Commun. Networks, (2019)Distortion-free secret image sharing method with two meaningful shadows., , and . IET Image Processing, 10 (8): 590-597 (2016)Secure CAS-based authentication scheme for mobile pay-TV systems., , and . Int. J. Commun. Syst., (2017)An authentication and key agreement protocol for satellite communications., , and . Int. J. Commun. Syst., 27 (10): 1994-2006 (2014)An Image Encryption Scheme Based on Concatenated Torus Automorphisms., , and . KSII Trans. Internet Inf. Syst., 7 (6): 1492-1511 (2013)A Fast and Secure Scheme for Data Outsourcing in the Cloud., , and . KSII Trans. Internet Inf. Syst., 8 (8): 2708-2722 (2014)Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations., , , , and . KSII Trans. Internet Inf. Syst., 14 (1): 437-454 (2020)Secure Authentication Scheme with Conditional Privacy Preservation in a Global Mobility Communication Network., , and . IECC, page 16-20. ACM, (2019)