Author of the publication

A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography.

, , , and . J. Medical Systems, 39 (3): 24 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel certificateless deniable authentication protocol., , , , and . IACR Cryptology ePrint Archive, (2013)Efficient and Short Identity-Based Deniable Authenticated Encryption., and . ICCCS (2), volume 10603 of Lecture Notes in Computer Science, page 244-255. Springer, (2017)An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks., , and . J. Medical Systems, 42 (8): 143:1-143:14 (2018)ID-Based Deniable Threshold Ring Authentication., , , and . HPCC/CSS/ICESS, page 1779-1784. IEEE, (2015)Efficient forward secure identity-based shorter signature from lattice., , , and . Comput. Electr. Eng., 40 (6): 1963-1971 (2014)A post-quantum communication secure identity-based proxy-signcryption scheme., , , and . Int. J. Electron. Secur. Digit. Forensics, 7 (2): 147-165 (2015)Certificateless aggregate deniable authentication protocol for ad hoc networks., and . Int. J. Electron. Secur. Digit. Forensics, 10 (2): 168-187 (2018)Secure fuzzy identity-based public verification for cloud storage., , , , and . J. Syst. Archit., (2022)EBIAC: Efficient biometric identity-based access control for wireless body area networks., , , , , and . J. Syst. Archit., (2021)Heterogeneous Deniable Authenticated Encryption Protocol., , , , and . FCS, volume 1286 of Communications in Computer and Information Science, page 331-346. Springer, (2020)