Author of the publication

Designing an Intelligent Health Monitoring System and Exploring User Acceptance for the Elderly.

, , and . J. Medical Systems, 37 (6): 9967 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improvement of the Miyazaki-Takaragi threshold digital signature scheme., , , and . Inf. Process. Lett., 88 (4): 183-186 (2003)Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations., , , and . FGIT-FGCN (1), volume 119 of Communications in Computer and Information Science, page 23-36. Springer, (2010)Design and Development a Social Networks Platform for Older People., , , and . HCI (6), volume 6766 of Lecture Notes in Computer Science, page 186-195. Springer, (2011)The effect of community identity on continuance intention of microblogging., and . Int. J. Electron. Bus., 10 (4): 355-382 (2013)Efficient proxy signature schemes using self-certified public keys., and . Appl. Math. Comput., 152 (3): 807-820 (2004)Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack., and . Appl. Math. Comput., 168 (1): 305-319 (2005)Recursive protocol for group-oriented authentication with key distribution., , , and . J. Syst. Softw., 81 (7): 1227-1239 (2008)A Novel Three-Factor Authentication Protocol for Multiple Service Providers in 6G-Aided Intelligent Healthcare Systems., , , , , and . IEEE Access, (2022)A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks., and . Inf. Sci., 179 (4): 422-429 (2009)A Novel Identity-Based Key-Insulated Convertible Authenticated Encryption Scheme., and . Int. J. Found. Comput. Sci., 22 (3): 739-756 (2011)