Author of the publication

A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card.

. IET Inf. Secur., 7 (1): 3-10 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System., , , and . J. Medical Systems, 39 (11): 144:1-144:11 (2015)A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System., , and . J. Medical Systems, 40 (5): 117:1-117:15 (2016)An Improvement of Remote Authentication and Key Agreement Schemes., , , and . Journal of Circuits, Systems, and Computers, 20 (4): 697-707 (2011)Security and Efficiency Analysis on a Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services., , and . IOV, volume 8662 of Lecture Notes in Computer Science, page 367-375. Springer, (2014)A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period., , and . ICCSA (3), volume 4707 of Lecture Notes in Computer Science, page 273-284. Springer, (2007)Reversible Data Hiding in Encrypted Image Based on Flipping MSB Encryption Process., , , , and . ICFET, page 108-112. ACM, (2020)Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks., , and . J. Inf. Sci. Eng., 34 (1): 155-170 (2018)Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks., and . Int. J. Netw. Secur., 8 (2): 166-168 (2009)An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS., , , , and . IEEE Access, (2021)On security of a more efficient and secure dynamic ID-based remote user authentication scheme., , , and . ISDA, page 1371-1375. IEEE, (2010)