Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning a generative classifier from label proportions., , , , , and . Neurocomputing, (2014)An Ensemble Learning Approach to Detect Malwares Based on Static Information., , , , , , and . ICA3PP (3), volume 12454 of Lecture Notes in Computer Science, page 676-686. Springer, (2020)Mobile ip registration in certificateless public key infrastructure., , , , , and . IET Inf. Secur., 1 (4): 167-173 (2007)A new proxy blind signature scheme., , and . Int. J. Grid Util. Comput., 3 (1): 38-42 (2012)Privacy-Preserving Spatial Keyword Search With Lightweight Access Control in Cloud Environments., , and . IEEE Internet Things J., 11 (7): 12377-12387 (April 2024)A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living., , , , , , and . Comput. Commun., (2022)Efficient ID-based registration protocol featured with user anonymity in mobile IP networks., , , , , , and . IEEE Trans. Wirel. Commun., 9 (2): 594-604 (2010)RSEL: revocable secure efficient lightweight RFID authentication scheme., , , , , and . Concurr. Comput. Pract. Exp., 26 (5): 1084-1096 (2014)Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV., , , , and . Peer-to-Peer Netw. Appl., 11 (4): 723-734 (2018)Secure, efficient and revocable data sharing scheme for vehicular fogs., , , , and . Peer-to-Peer Netw. Appl., 11 (4): 766-777 (2018)