Author of the publication

Improvement of robust smart-card-based password authentication scheme.

, , , and . Int. J. Commun. Syst., 28 (2): 383-393 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modelization and analysis of dynamic heterogeneous redundant system., , , , , and . Concurr. Comput. Pract. Exp., (2022)A Novel ID-based Multi-domain Handover Protocol for Mesh Points in WMNs., , , and . KSII Trans. Internet Inf. Syst., 9 (7): 2512-2529 (2015)A Framework for Mimic Defense System in Cyberspace., , , , , and . J. Signal Process. Syst., 93 (2-3): 169-185 (2021)A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems., , , , and . Inf. Technol. Control., 44 (2): 195-206 (2015)Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks., , and . Secur. Commun. Networks, (2018)Anonymous Network Information Acquirement Protocol for Mobile Users in Heterogeneous Wireless Networks., , , and . Int. J. Netw. Secur., 18 (1): 193-200 (2016)A fine-grained anonymous handover authentication protocol based on consortium blockchain for wireless networks., , , and . J. Parallel Distributed Comput., (2021)Ticket-Based Authentication for Fast Handover in Wireless Mesh Networks., , and . Wireless Personal Communications, 85 (3): 1509-1523 (2015)A New Privacy-Aware Handover Authentication Scheme for Wireless Networks., , , and . Wirel. Pers. Commun., 80 (2): 581-589 (2015)Observational equivalence and security games: Enhancing the formal analysis of security protocols., , , , and . Comput. Secur., (2024)