Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Security Protocols for Mobile Healthcare., , , and . J. Medical Systems, 40 (11): 229:1-229:10 (2016)A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems.. J. Medical Systems, 39 (3): 30 (2015)An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System., and . J. Medical Systems, 37 (5): 9969 (2013)An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card., , and . J. Inf. Secur. Appl., (2015)Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks., , , , , and . IEEE Internet of Things Journal, 5 (1): 269-282 (2018)A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography., , , and . IEEE Access, (2016)Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks., , and . SSCC, volume 377 of Communications in Computer and Information Science, page 243-254. Springer, (2013)Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks.. SSCC, volume 467 of Communications in Computer and Information Science, page 1-9. Springer, (2014)Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks., , and . SSCC, volume 467 of Communications in Computer and Information Science, page 10-19. Springer, (2014)An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems., , and . Wireless Personal Communications, 84 (4): 2571-2598 (2015)