Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems., , , , and . Computing, 106 (7): 2427-2458 (July 2024)A secure end-to-end proximity NFC-based mobile payment protocol., and . Comput. Stand. Interfaces, (2019)A secure end-to-end SMS-based mobile banking protocol., and . Int. J. Commun. Syst., (2017)Blockchain based security framework for sharing digital images using reversible data hiding and encryption., , and . Multim. Tools Appl., 81 (17): 24721-24738 (2022)VAPTAi: A Threat Model for Vulnerability Assessment and Penetration Testing of Android and iOS Mobile Banking Apps., and . CIC, page 77-86. IEEE Computer Society, (2017)VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment., , and . Veh. Commun., (2024)SSMBP: A secure SMS-based mobile banking protocol with formal verification., and . WiMob, page 252-259. IEEE Computer Society, (2015)A secure IoT-based micro-payment protocol for wearable devices., , , , and . Peer-to-Peer Netw. Appl., 15 (2): 1163-1188 (2022)STAMBA: Security Testing for Android Mobile Banking Apps., and . SIRS, volume 425 of Advances in Intelligent Systems and Computing, page 671-683. Springer, (2015)Reliable and privacy-preserving multi-instance iris verification using Paillier homomorphic encryption and one-digit checksum., , , , and . Signal Image Video Process., 18 (4): 3723-3735 (June 2024)