Author of the publication

On the security and improvement of a two-factor user authentication scheme in wireless sensor networks.

, , , , and . Pers. Ubiquitous Comput., 17 (5): 895-905 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One-round provably secure yoking-proof for RFID applications., , , and . Concurr. Comput. Pract. Exp., (2019)Spatio-temporal deep learning method for ADHD fMRI classification., , , , , , , and . Inf. Sci., (2019)TT-SVD: An Efficient Sparse Decision-Making Model With Two-Way Trust Recommendation in the AI-Enabled IoT Systems., , , , , , , and . IEEE Internet Things J., 8 (12): 9559-9567 (2021)Multi-Layer Network Local Community Detection Based on Influence Relation., , , , , and . IEEE Access, (2019)Heterogeneous Information Network Representation Learning Incorporating Community Structure., , , , , and . IEEE Access, (2022)Privacy-preserving categorization of mobile applications based on large-scale usage data., , , , , and . Inf. Sci., (2020)A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems., , , , , , , , and . IEEE Trans. Ind. Informatics, 16 (3): 2091-2101 (2020)Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality., , , , , and . IEEE Access, (2019)Sensing Users' Emotional Intelligence in Social Networks., , , , , and . IEEE Trans. Comput. Social Systems, 7 (1): 103-112 (2020)Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks., , , and . IEEE Syst. J., 13 (2): 1454-1465 (2019)