Author of the publication

An enhanced biometrics-based remote user authentication scheme using mobile devices.

, and . Int. J. Comput. Intell. Stud., 1 (4): 333-348 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure and lightweight authentication scheme for roaming service in global mobile networks., and . J. Inf. Secur. Appl., (2018)Robust and secure authentication protocol protecting privacy for roaming mobile user in global mobility networks., and . Int. J. Grid Util. Comput., 12 (1): 94-111 (2021)Enhancing Intrusion Detection System Using Machine Learning and Deep Learning., , and . AINA (3), volume 201 of Lecture Notes on Data Engineering and Communications Technologies, page 326-337. Springer, (2024)Blockchain Based Artificial Intelligence of Things (AIoT) for Wildlife Monitoring., and . AINA (5), volume 203 of Lecture Notes on Data Engineering and Communications Technologies, page 25-36. Springer, (2024)An Efficient Fingerprint-Based Remote User Authentication Protocol Using Mobile Devices., and . SocProS (2), volume 131 of Advances in Intelligent and Soft Computing, page 569-578. Springer, (2011)An enhanced biometrics-based remote user authentication scheme using mobile devices., and . Int. J. Comput. Intell. Stud., 1 (4): 333-348 (2012)An Efficient and Secure Authentication Scheme With User Anonymity for Roaming Service in Global Mobile Networks., and . ICCNS, page 119-126. ACM, (2016)Prevention of SQL Injection Attacks Using Cryptography and Pattern Matching., and . AINA (2), volume 450 of Lecture Notes in Networks and Systems, page 624-634. Springer, (2022)Smart Card Based Remote User Authentication Scheme for Cloud Computing., and . UEMCON, page 905-910. IEEE, (2019)Security bound enhancement of remote user authentication using smart card., and . J. Inf. Secur. Appl., (2017)