Author of the publication

Secure anonymous mutual authentication for star two-tier wireless body area networks.

, , , , and . Comput. Methods Programs Biomed., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Big data: Issues, challenges, tools and Good practices., , and . IC3, page 404-409. IEEE, (2013)Performance of a LAN under different ethernet wiring standards., , and . CUBE, page 166-172. ACM, (2012)A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography., , , and . Wireless Personal Communications, 91 (3): 1361-1391 (2016)Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges., , , , and . IEEE Access, (2020)Provably Secure Authenticated Key Agreement Scheme for Smart Grid., , , and . IEEE Trans. Smart Grid, 9 (3): 1900-1910 (2018)Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment., , , , , and . IEEE Internet of Things Journal, 4 (5): 1634-1646 (2017)Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications., , , , , , and . IEEE Access, (2017)Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions., , , and . IEEE Consumer Electronics Magazine, 7 (1): 57-65 (2018)IoMT Malware Detection Approaches: Analysis and Research Challenges., , , , and . IEEE Access, (2019)Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges., , , , , and . IEEE Access, (2020)