From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography., , , и . Wireless Personal Communications, 91 (3): 1361-1391 (2016)Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function., , и . SSCC, том 377 из Communications in Computer and Information Science, стр. 236-242. Springer, (2013)A Multi-server Environment with Secure and Efficient Remote User Authentication Scheme Based on Dynamic ID Using Smart Cards., , и . Wireless Personal Communications, 95 (3): 2735-2767 (2017)A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks.. Int. J. Inf. Sec., 11 (3): 189-211 (2012)Blockchain-Envisioned Provably Secure Multivariate Identity-Based Multi-Signature Scheme for Internet of Vehicles Environment., , , , , и . IEEE Trans. Veh. Technol., 71 (9): 9853-9867 (2022)On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System., , , , , и . IEEE Trans. Veh. Technol., 70 (2): 1736-1751 (2021)An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function., , и . Int. J. Commun. Networks Distributed Syst., 12 (2): 129-151 (2014)A New Biometric-Based Remote User Authentication Scheme in Hierarchical Wireless Body Area Sensor Networks., , и . Ad Hoc Sens. Wirel. Networks, 28 (3-4): 221-256 (2015)A hybrid ensemble machine learning model for detecting APT attacks based on network behavior anomaly detection., , , и . Concurr. Comput. Pract. Exp., (2023)SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment., , , , и . IEEE Commun. Mag., 56 (1): 78-85 (2018)