Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Anonymous Certificateless Signcryption Scheme for Internet of Health Things., , , , and . IEEE Access, (2021)Exploring the Influence of Direct and Indirect Factors on Information Security Policy Compliance: A Systematic Literature Review., and . IEEE Access, (2021)Enhancement of E-commerce Service by Designing Last Mile Delivery Platform., , and . Comput. Syst. Sci. Eng., 42 (1): 49-67 (2022)Predicting Mobile Cross-Platform Adaptation Using a Hybrid Sem-ANN Approach.. Comput. Syst. Sci. Eng., 42 (2): 639-658 (2022)Evaluating fallback authentication research: A systematic literature review., and . Comput. Secur., (2021)A Provable and Privacy-Preserving Authentication Scheme for UAV-Enabled Intelligent Transportation Systems., , , , , , , and . IEEE Trans. Ind. Informatics, 18 (5): 3416-3425 (2022)Applying Task-Technology Fit to the Adoption of Identity Management Systems., and . ACIS, (2011)Cost-Effective Proxy Signcryption Scheme for Internet of Things., , , and . Mob. Inf. Syst., (2021)Evaluating knowledge-based security questions for fallback authentication., and . PeerJ Comput. Sci., (2022)Children's Behavior on the Internet: Conceptualizing the Synergy of Privacy and Information Disclosure., and . ICCCM, page 117-123. ACM, (2021)