Author of the publication

Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.

, and . J. Medical Systems, 40 (11): 237:1-237:19 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new approach to active rule scheduling., , and . Eng. Appl. Artif. Intell., (2015)Edge Computing: A Systematic Mapping Study., , , , , , , and . CoRR, (2021)A New Approach to Reliable, yet Flexible Software.. CAiSE (Doctoral Consortium), volume 731 of CEUR Workshop Proceedings, page 3-14. CEUR-WS.org, (2011)Reliable yet flexible software through formal model transformation (rule definition)., and . Knowl. Inf. Syst., 40 (1): 79-126 (2014)A two-stage location-sensitive and user preference-aware recommendation system., and . Expert Syst. Appl., (2022)Edge computing: A systematic mapping study., , , , , , , and . Concurr. Comput. Pract. Exp., (2023)Towards event aggregation for reducing the volume of logged events during IKC stages of APT attacks., , and . CoRR, (2021)A Pattern-aware Design and Implementation Guideline for Microservice-based Systems., and . CSICC, page 1-6. IEEE, (2022)A secure authentication and key agreement scheme for roaming service with user anonymity., and . Int. J. Commun. Syst., (2017)CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks., , and . Int. J. Crit. Infrastructure Prot., (September 2023)