Author of the publication

Notes on "Secure authentication scheme for IoT and cloud servers".

, , and . Pervasive Mob. Comput., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems., and . J. Inf. Hiding Multim. Signal Process., 6 (2): 288-296 (2015)An Efficient Smart Card Based Authentication Scheme Using Image Encryption., , , and . J. Inf. Sci. Eng., 29 (6): 1135-1150 (2013)Distortion-free secret image sharing method with two meaningful shadows., , and . IET Image Processing, 10 (8): 590-597 (2016)Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data., , , and . Secur. Commun. Networks, (2019)An authentication and key agreement protocol for satellite communications., , and . Int. J. Commun. Syst., 27 (10): 1994-2006 (2014)Secure CAS-based authentication scheme for mobile pay-TV systems., , and . Int. J. Commun. Syst., (2017)An Image Encryption Scheme Based on Concatenated Torus Automorphisms., , and . KSII Trans. Internet Inf. Syst., 7 (6): 1492-1511 (2013)A Fast and Secure Scheme for Data Outsourcing in the Cloud., , and . KSII Trans. Internet Inf. Syst., 8 (8): 2708-2722 (2014)Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations., , , , and . KSII Trans. Internet Inf. Syst., 14 (1): 437-454 (2020)Secure Authentication Scheme with Conditional Privacy Preservation in a Global Mobility Communication Network., , and . IECC, page 16-20. ACM, (2019)