Author of the publication

Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks.

, , , and . Secur. Commun. Networks, 9 (18): 5563-5580 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks., , and . SSCC, volume 377 of Communications in Computer and Information Science, page 243-254. Springer, (2013)Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks.. SSCC, volume 467 of Communications in Computer and Information Science, page 1-9. Springer, (2014)Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks., , and . SSCC, volume 467 of Communications in Computer and Information Science, page 10-19. Springer, (2014)An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems., , and . Wireless Personal Communications, 84 (4): 2571-2598 (2015)A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks., , , and . Wireless Personal Communications, 94 (3): 1899-1933 (2017)A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks., and . Wireless Personal Communications, 94 (3): 1165-1191 (2017)Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment., , , , , , and . J. Inf. Secur. Appl., (2020)DDoS attack resisting authentication protocol for mobile based online social network applications., , , , , and . J. Inf. Secur. Appl., (2022)Software-defined networking security for private data center networks and clouds: Vulnerabilities, attacks, countermeasures, and solutions., , , , , , and . Int. J. Commun. Syst., (2021)RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment., , , , , and . Int. J. Commun. Syst., (2019)