Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'., and . Int. J. Commun. Syst., 27 (12): 3939-3955 (2014)Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps., , and . Int. J. Commun. Syst., (2017)An Improved Efficient Remote Password Authentication Scheme with Smart Card over Insecure Networks., , and . Int. J. Netw. Secur., 13 (3): 167-177 (2011)Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0"., , , and . IEEE Internet Things J., 7 (5): 4676-4681 (2020)An Enhanced Authentication Protocol for RFID Systems., , , , , , , and . IEEE Access, (2020)AMAPG: Advanced Mobile Authentication Protocol for GLOMONET., , , , , , , and . IEEE Access, (2021)An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring., , , , , and . J. Ambient Intell. Humaniz. Comput., 15 (1): 1165-1186 (January 2024)An efficient and secure design of multi-server authenticated key agreement protocol., , , , , , and . J. Supercomput., 74 (9): 4771-4797 (2018)Lightweight Authentication Protocol for NFC Based Anti-Counterfeiting System in IoT Infrastructure., , and . IEEE Access, (2020)Voice-Transfer Attacking on Industrial Voice Control Systems in 5G-Aided IIoT Domain., , , , , and . IEEE Trans. Ind. Informatics, 17 (10): 7085-7092 (2021)