Author of the publication

Security Analysis of a User Authentication Scheme for IoT-Based Healthcare.

, , , , and . IEEE Internet Things J., 10 (7): 6527-6530 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy., , and . Int. J. Netw. Secur., 7 (2): 181-186 (2008)CACPA: Credible Alliance-Chain-Based Public Auditing Scheme for Cloud Storage., , , , and . IEEE Access, (2023)Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing., , and . Int. J. Netw. Secur., 7 (3): 342-347 (2008)Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings., , and . IMSCCS (2), page 109-112. IEEE Computer Society, (2006)0-7695-2581-4.New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles)., , and . IACR Cryptology ePrint Archive, (2006)Analysis of USBSCAN Driver., , and . ICMLSC, page 187-190. ACM, (2017)A CCA2-Secure Multi-Decrypter Encryption Scheme Without Random Oracles., , , and . Informatica, 26 (3): 543-556 (2015)Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification., , and . Appl. Math. Comput., 169 (2): 1419-1430 (2005)Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications., and . IACR Cryptology ePrint Archive, (2007)Security-Enhanced Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare., , , , , and . IEEE Internet Things J., 11 (6): 9599-9609 (March 2024)