Author of the publication

Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0".

, , , and . IEEE Internet Things J., 7 (5): 4676-4681 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient certificateless aggregate signature with constant pairing computations., , , and . Inf. Sci., (2013)Privacy-Preserving English Auction Protocol with Round Efficiency, and . CoRR, (2010)Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model., , and . Wireless Personal Communications, 79 (2): 1401-1416 (2014)Strength Analysis of the Main Structural Component in Ship-to-Shore Cranes Under Dynamic Load., , , and . IEEE Access, (2019)Hierarchical Distributed Coordination for Economic Dispatch., , , , , and . ISIE, page 1149-1154. IEEE, (2018)Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (1): 256-258 (2012)Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things., , , and . IACR Cryptol. ePrint Arch., (2020)Security and Privacy in IoT-Cloud-Based e-Health Systems - A Comprehensive Review., , and . Symmetry, 12 (7): 1191 (2020)Identity Based Key-Insulated Encryption with Outsourced Equality Test., , , and . Int. J. Netw. Secur., 22 (2): 257-264 (2020)Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System., , , , and . Int. J. Netw. Secur., 18 (2): 235-243 (2016)