Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight Key Agreement and Authentication Scheme for Satellite-Communication Systems., , , , , and . IEEE Access, (2020)A Provably Secure Mobile User Authentication Scheme for Big Data Collection in IoT-Enabled Maritime Intelligent Transportation System., , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (2): 2411-2421 (February 2023)Cloud-Assisted Secure and Cost-Effective Authenticated Solution for Remote Wearable Health Monitoring System., , , , , , and . IEEE Trans. Netw. Sci. Eng., 10 (5): 2710-2718 (September 2023)Secure Consumer-Centric Demand Response Management in Resilient Smart Grid as Industry 5.0 Application With Blockchain-Based Authentication., , , , , and . IEEE Trans. Consumer Electron., 70 (1): 1370-1379 (February 2024)A Neural Computing-Based Access Control Protocol for AI-Driven Intelligent Flying Vehicles in Industry 5.0-Assisted Consumer Electronics., , , , , and . IEEE Trans. Consumer Electron., 70 (1): 3573-3581 (February 2024)Provably Secure Conditional-Privacy Access Control Protocol for Intelligent Customers-Centric Communication in VANET., , , , , , and . IEEE Trans. Consumer Electron., 70 (1): 1747-1756 (February 2024)Security Analysis on Ä Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems"., , , , and . IEEE Syst. J., 15 (4): 5557-5559 (2021)A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance., , , , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (10): 19634-19643 (2022)Comments on ÄKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment"., , and . IEEE Internet Things J., 7 (5): 4671-4675 (2020)Fuzzy extraction and PUF based three party authentication protocol using USB as mass storage device., , , , and . J. Inf. Secur. Appl., (2020)