Author of the publication

A provably secure anonymous authentication scheme for Session Initiation Protocol.

, , , , , and . Secur. Commun. Networks, 9 (18): 5016-5027 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cloud-assisted Industrial Systems and Applications., , , and . Mob. Networks Appl., 21 (5): 822-824 (2016)Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems., and . J. Medical Syst., 38 (10): 135 (2014)Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions., , , , , and . IEEE Commun. Surv. Tutorials, 20 (2): 1443-1474 (2018)Adaptively weighted sub-directional two-dimensional linear discriminant analysis for face recognition., , , and . Future Gener. Comput. Syst., 28 (1): 232-235 (2012)Bat algorithm-based beamforming for mmWave massive MIMO systems., , , , , and . Int. J. Commun. Syst., (2020)Design of a user anonymous password authentication scheme without smart card., , , and . Int. J. Commun. Syst., 29 (3): 441-458 (2016)Radiological image retrieval technique using multi-resolution texture and shape features., , , , and . Multim. Tools Appl., 81 (10): 13633-13660 (2022)On the Security of a RSA-based Certificateless Signature Scheme., , and . Int. J. Netw. Secur., 16 (1): 78-80 (2014)Privacy-Enabling Framework for Cloud-Assisted Digital Healthcare Industry., , , , , and . IEEE Trans. Ind. Informatics, 18 (11): 8316-8325 (2022)A scene image classification technique for a ubiquitous visual surveillance system., , , , , and . Multim. Tools Appl., 78 (5): 5791-5818 (2019)