Author of the publication

Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network.

, , , , , , and . Multim. Tools Appl., 82 (22): 33637-33662 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems., , and . J. Medical Systems, 39 (9): 89:1-89:16 (2015)An improved address ownership in mobile IPv6., , and . Comput. Commun., 31 (14): 3250-3252 (2008)A dynamic identity-based user authentication scheme for remote login systems., , and . Secur. Commun. Networks, 8 (18): 3372-3382 (2015)A Novel Frequency Billing Service in Digital Television System., , and . J. Inf. Hiding Multim. Signal Process., 5 (3): 439-450 (2014)Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme., , , , , and . Future Internet, 15 (3): 99 (March 2023)A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture., , , and . J. Inf. Sci. Eng., 31 (6): 1975-1992 (2015)ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks., , , and . Cryptogr., 5 (4): 35 (2021)Two Attacks on the Wu-Hsu User Identification Scheme.. Int. J. Netw. Secur., 1 (3): 147-148 (2005)A Secure and Efficient One-time Password Authentication Scheme for WSN., , , and . Int. J. Netw. Secur., 19 (2): 177-181 (2017)A Robust Remote User Authentication Scheme against Smart Card Security Breach., , , and . DBSec, volume 6818 of Lecture Notes in Computer Science, page 231-238. Springer, (2011)