Author of the publication

A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments.

, , and . AsiaJCIS, page 91-96. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifiable Privacy-Preserving Payment Mechanism for Smart Grids., , , , and . IDCS, volume 11226 of Lecture Notes in Computer Science, page 52-63. Springer, (2018)ReHand: Secure Region-based Fast Handover with User Anonymity for Small Cell Networks in 5G., , , , , and . CoRR, (2018)Local Authentication and Access Control Scheme in M2M Communications With Computation Offloading., , , and . IEEE Internet of Things Journal, 5 (4): 3209-3219 (2018)Probably Secure Efficient Anonymous Credential Scheme., , , , and . Int. J. Softw. Innov., 6 (3): 18-35 (2018)Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System., , , and . IEEE Trans. Netw. Serv. Manag., 18 (1): 701-712 (2021)Secure Certificateless Signature Scheme Supporting Batch Verification., , , and . AsiaJCIS, page 8-11. IEEE Computer Society, (2013)A Lightweight and Robust Authentication and Key Agreements with Physically Unclonable Function in Manufacturing Environments., , , , and . ICS, volume 1723 of Communications in Computer and Information Science, page 387-397. Springer, (2022)Multireceiver Predicate Encryption for Online Social Networks., , , , and . IEEE Trans. Signal Inf. Process. over Networks, 3 (2): 388-403 (2017)Anonymous and Unlinkable Identity Scheme in Open Data Environment., , , , , , and . AsiaJCIS, page 73-80. IEEE, (2023)Identity-Based Signature from Quadratic Residues and Its Extension to ID-Based Multi-Signature., and . AsiaJCIS, page 31-36. IEEE, (2021)