Author of the publication

A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.

, , , , , and . Secur. Commun. Networks, 9 (15): 2643-2655 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment., , , , , and . IEEE J. Biomed. Health Informatics, 22 (4): 1310-1322 (2018)Information Sharing in Vehicular AdHoc Network., , , , and . Int. J. Comput. Commun. Control, 5 (5): 892-899 (2010)Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges, , , , and . International Journal of Communication Systems, (2019)Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges., , , , and . Int. J. Commun. Syst., (2022)SEBAP: A secure and efficient biometric-assisted authentication protocol using ECC for vehicular cloud computing., , , , and . Int. J. Commun. Syst., (2021)A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography., , , , and . Int. J. Comput. Math., 94 (1): 39-55 (2017)A blind image copyright protection scheme for e-government., , , , , and . J. Vis. Commun. Image Represent., 24 (7): 1099-1105 (2013)An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks., , , , , and . Inf. Sci., (2015)Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis., , , , , , , , , and 3 other author(s). IEEE Access, (2016)Optimizing the Lifetime of Software Defined Wireless Sensor Network via Reinforcement Learning., , , , , and . IEEE Access, (2021)