Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Anonymous Mutual Authentication Scheme for n-Times Ubiquitous Mobile Cloud Computing Services., and . IEEE Internet of Things Journal, 4 (5): 1764-1772 (2017)An Efficient Data Aggregation Scheme for Privacy-Friendly Dynamic Pricing-Based Billing and Demand-Response Management in Smart Grids., and . IEEE Internet Things J., 5 (4): 3126-3135 (2018)A Scalable Protocol Level Approach to Prevent Machine Learning Attacks on Physically Unclonable Function Based Authentication Mechanisms for Internet of Medical Things., , and . IEEE Trans. Ind. Informatics, 18 (3): 1971-1980 (2022)Consensus Adversarial Defense Method Based on Augmented Examples., , , , and . IEEE Trans. Ind. Informatics, 19 (1): 984-994 (2023)Edge-Based Collaborative Training System for Artificial Intelligence-of-Things., , , , , , , , , and . IEEE Trans. Ind. Informatics, 18 (10): 7162-7173 (2022)A Comparative Study of Design Paradigms for PUF-Based Security Protocols for IoT Devices: Current Progress, Challenges, and Future Expectation., and . Computer, 54 (11): 36-46 (2021)Provably secure mutual authentication and key agreement scheme with user anonymity., and . ICICS, page 1-5. IEEE, (2013)Anonymous mutual authentication with location privacy support for secure communication in M2M home network services.. J. Ambient Intell. Humaniz. Comput., 10 (1): 153-161 (2019)PhenoAuth: A Novel PUF-Phenotype-based Authentication Protocol for IoT Devices., , , , and . CoRR, (2024)Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids., and . IEEE Trans. Inf. Forensics Secur., 14 (6): 1554-1566 (2019)