Author of the publication

An ID-Based User Authentication Scheme for Cloud Computing.

, and . IIH-MSP, page 98-101. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A user authentication scheme on multi-server environments for cloud computing., , and . ICICS, page 1-4. IEEE, (2013)Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem., and . ISDA (3), page 3-5. IEEE Computer Society, (2008)An ID-Based User Authentication Scheme for Cloud Computing., and . IIH-MSP, page 98-101. IEEE, (2014)An Enterprise Digital Right Management Scheme with Anonymous Trust for Mobile Devices., , and . Informatica (Slovenia), 37 (3): 307-313 (2013)Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices., , and . CIT (2), page 131-135. IEEE Computer Society, (2009)978-0-7695-3836-5.An Efficient and Flexible Mobile Payment Protocol., , and . ICGEC, page 63-66. IEEE, (2012)An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy., , and . IIH-MSP, page 1537-1540. IEEE Computer Society, (2008)A high-speed division algorithm in residue number system using parity., , and . Int. J. Comput. Math., 81 (6): 775-780 (2004)A source authentication scheme based on message recovery digital signature for multicast., and . Int. J. Commun. Syst., 27 (11): 2616-2627 (2014)An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem., and . Comput. Secur., 28 (3-4): 138-143 (2009)