Author of the publication

An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains.

, , , , , and . Secur. Commun. Networks, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains., , , , , and . Secur. Commun. Networks, (2020)Cryptanalysis and Improvement of an Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing., , , and . IEEE Access, (2019)An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices., , , , and . Wirel. Commun. Mob. Comput., (2020)Vetaverse: Technologies, Applications, and Visions toward the Intersection of Metaverse, Vehicles, and Transportation Systems., , , , , , , , , and 5 other author(s). CoRR, (2022)The Convergence of a Class of Parallel Newton-Type Iterative Methods.. Adv. Numerical Analysis, (2017)Noise-NeRF: Hide Information in Neural Radiance Fields using Trainable Noise., , , and . CoRR, (2024)Intelligent color matching model for wood dyeing using Genetic Algorithm and Extreme learning machine., , , and . J. Intell. Fuzzy Syst., 42 (6): 4907-4917 (2022)A Lightweight Three-Factor Authentication and Key Agreement Scheme for Multigateway WSNs in IoT., , , , and . Secur. Commun. Networks, (2021)A blockchain-based scheme for privacy-preserving and secure sharing of medical data., , , , and . Comput. Secur., (2020)