Author of the publication

Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for IoT applications.

, , , , , , and . Trans. Emerg. Telecommun. Technol., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

M-MEMHS: Modified Minimization of Error in Multihop System for Localization of Unknown Sensor Nodes., , , , and . IEEE Syst. J., 13 (1): 215-225 (2019)Partial reversible data hiding scheme using (7, 4) hamming code., , and . Multim. Tools Appl., 76 (20): 21691-21706 (2017)Analysis and enhancement of secure three-factor user authentication using Chebyshev Chaotic Map., , , and . J. Inf. Secur. Appl., (2021)SiCaL: a swarm inspired congestion aware probabilistically load balance routing in MANETs., , and . Int. J. Inf. Commun. Technol., 7 (6): 585-606 (2015)An Efficient Biometric and Password-Based Remote User Authentication using Smart Card for Telecare Medical Information Systems in Multi-Server Environment., and . J. Medical Syst., 38 (12): 142 (2014)Security analysis and design of an efficient ECC-based two-factor password authentication scheme., , , , and . Secur. Commun. Networks, 9 (17): 4166-4181 (2016)SAS-SIP: A secure authentication scheme based on ECC and a fuzzy extractor for session initiation protocol., , and . Cryptologia, 43 (3): 212-232 (2019)A New Image Encryption Based on Two Chaotic Maps and Affine Transform., , and . CICBA, volume 1579 of Communications in Computer and Information Science, page 100-114. Springer, (2022)On the Design of a Secure Anonymous User Authentication Scheme for Multiple Base Stations Based Wireless Sensor Networks., , , , and . ICMC, volume 1170 of Advances in Intelligent Systems and Computing, page 1-17. Springer, (2019)An Efficient Data Hiding Scheme using Hamming Error Correcting Code., , and . ICCCT, page 360-365. ACM, (2015)