Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems., , and . J. Medical Systems, 39 (5): 58 (2015)An Efficient Chaotic Maps-Based Authentication and Key Agreement Scheme Using Smartcards for Telecare Medicine Information Systems.. J. Medical Systems, 37 (6): 9985 (2013)User authentication scheme with anonymity, unlinkability and untrackability for global mobility networks.. Secur. Commun. Networks, 6 (11): 1404-1413 (2013)Efficient three-party encrypted key exchange using trapdoor functions., , and . Secur. Commun. Networks, 6 (11): 1353-1358 (2013)Communication-efficient three-party protocols for authentication and key agreement., , , , and . Comput. Math. Appl., 58 (4): 641-648 (2009)Efficient Extended Chaotic Map-Based IBE for Industrial Environment., and . IEEE Access, (2022)Enhanced three-party encrypted key exchange without server public keys., , and . Comput. Secur., 23 (7): 571-577 (2004)Efficient Signature Scheme Using Extended Chaotic Maps for Medical Imaging Records., , and . ICMHI, page 118-121. ACM, (2020)Simple password-based three-party authenticated key exchange without server public keys., and . Inf. Sci., 180 (9): 1702-1714 (2010)Simple Group Password-based Authenticated Key Agreements for the Integrated EPR Information System., , and . J. Medical Systems, 37 (2): 9916 (2013)