Author of the publication

A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem.

, , , and . Comput. Commun., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks., , , and . Secur. Commun. Networks, (2019)Anonymous authentication scheme for smart home environment with provable security., , , and . Comput. Secur., (2019)A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem., , , and . Comput. Commun., (2020)Efficient and privacy-preserving authentication scheme for wireless body area networks., , , , and . J. Inf. Secur. Appl., (2020)An Efficient Lightweight Authentication Scheme With Adaptive Resilience of Asynchronization Attacks for Wireless Sensor Networks., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 51 (9): 5626-5638 (2021)A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications., , , , and . J. Organ. End User Comput., 33 (3): 1-18 (2021)Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs., , , and . IET Inf. Secur., 14 (4): 380-390 (2020)F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network., , , and . Secur. Commun. Networks, (2021)