Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment., , and . ITC, 42 (4): 315-324 (2013)An efficient and reliable E-DRM scheme for mobile environments., , and . Expert Syst. Appl., 37 (9): 6176-6181 (2010)A user authentication scheme on multi-server environments for cloud computing., , and . ICICS, page 1-4. IEEE, (2013)A mobile payment mechanism with anonymity for cloud computing., and . J. Syst. Softw., (2016)Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem., and . ISDA (3), page 3-5. IEEE Computer Society, (2008)An efficient password authenticated key exchange protocol for imbalanced wireless networks., , and . Comput. Stand. Interfaces, 27 (3): 313-322 (2005)Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery., , and . Informatica, 28 (2): 375-386 (2017)Efficient residue number system iterative modular multiplication algorithm for fast modular exponentiation., and . IET Comput. Digit. Tech., 2 (1): 1-5 (2008)An ID-Based User Authentication Scheme for Cloud Computing., and . IIH-MSP, page 98-101. IEEE, (2014)An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments., and . J. Syst. Softw., 82 (9): 1497-1502 (2009)