Author of the publication

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks.

, , , , , and . Comput. Networks, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity., and . J. Medical Systems, 39 (8): 78 (2015)An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS., and . J. Medical Systems, 39 (8): 79 (2015)Design of an efficient ID-based short designated verifier proxy signature scheme., and . RAIT, page 48-53. IEEE, (2012)Modification of Traditional RSA into Symmetric-RSA Cryptosystems., and . Int. J. Bus. Data Commun. Netw., 13 (1): 66-73 (2017)Design of ECC-Based ElGamal Encryption Scheme Using CL-PKC., , and . RAIT, volume 266 of Advances in Intelligent Systems and Computing, page 27-34. Springer, (2014)Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment., and . ACC (2), volume 191 of Communications in Computer and Information Science, page 628-635. Springer, (2011)Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment., and . Wireless Personal Communications, 84 (1): 439-462 (2015)Design of Image Cryptosystem by Simultaneous VQ-Compression and Shuffling of Codebook and Index Matrix, , and . CoRR, (2011)Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS., and . AST/UCMA/ISA/ACN, volume 6059 of Lecture Notes in Computer Science, page 397-408. Springer, (2010)Establishment of Authenticated Secret Session Keys Using Digital Signature Standard.. Inf. Secur. J. A Glob. Perspect., 20 (1): 9-16 (2011)