Author of the publication

CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment.

, , , and . FCS, volume 1105 of Communications in Computer and Information Science, page 67-83. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes., , , and . Wireless Personal Communications, 80 (4): 1671-1685 (2015)AKAIoTs: authenticated key agreement for Internet of Things., , , , and . Wireless Networks, 25 (6): 3081-3101 (2019)Remote Authentication Schemes for Wireless Body Area Networks Based on the Internet of Things., , , , and . IEEE Internet of Things Journal, 5 (6): 4926-4944 (2018)An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs., , , and . IEEE Trans. Veh. Technol., 69 (10): 11266-11280 (2020)A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks., , , , and . Secur. Commun. Networks, 9 (17): 4138-4150 (2016)An Efficient Remote Authentication Scheme for Wireless Body Area Network., , and . J. Medical Syst., 41 (2): 25:1-25:9 (2017)Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system., , , and . Ann. des Télécommunications, 74 (7-8): 435-449 (2019)Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information., , and . Quantum Inf. Process., 19 (8): 233 (2020)Traffic data extraction and labeling for machine learning based attack detection in IoT networks., , and . Int. J. Mach. Learn. Cybern., 14 (7): 2317-2332 (July 2023)A cloud data deduplication scheme based on certificateless proxy re-encryption., , , and . J. Syst. Archit., (2020)