Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Identity Based Online/Off-Line Signcryption Scheme for Secure Communication in Internet of Things., , , , , and . IEEE Access, (2021)Lightweight Authentication Protocol for NFC Based Anti-Counterfeiting System in IoT Infrastructure., , and . IEEE Access, (2020)A Lightweight Key Agreement and Authentication Scheme for Satellite-Communication Systems., , , , , and . IEEE Access, (2020)A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments., , , , , , , and . IEEE Access, (2020)RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications., , , , , and . IEEE Access, (2020)An efficient and secure design of multi-server authenticated key agreement protocol., , , , , , and . J. Supercomput., 74 (9): 4771-4797 (2018)An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring., , , , , and . J. Ambient Intell. Humaniz. Comput., 15 (1): 1165-1186 (January 2024)An Improved Efficient Remote Password Authentication Scheme with Smart Card over Insecure Networks., , and . Int. J. Netw. Secur., 13 (3): 167-177 (2011)AMAPG: Advanced Mobile Authentication Protocol for GLOMONET., , , , , , , and . IEEE Access, (2021)Voice-Transfer Attacking on Industrial Voice Control Systems in 5G-Aided IIoT Domain., , , , , and . IEEE Trans. Ind. Informatics, 17 (10): 7085-7092 (2021)