From post

An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography.

, , , и . Multim. Tools Appl., 76 (2): 1801-1815 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimum design of fractional order PIλDμ controller for AVR system using chaotic ant swarm., , , , и . Expert Syst. Appl., 39 (8): 6887-6896 (2012)Synchronization control of memristor-based recurrent neural networks with perturbations., , , , и . Neural Networks, (2014)Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations., , , , и . Neural Processing Letters, 47 (2): 679-696 (2018)Multiple Vectors Propagation of Epidemics in Complex Networks., , , , и . CoRR, (2013)A secure and effective anonymous authentication scheme for roaming service in global mobility networks., , , и . CoRR, (2013)Multiple routes transmitted epidemics on multiplex networks., , , , и . CoRR, (2013)General Theory of Security and a Study Case in Internet of Things., , , и . IEEE Internet Things J., 4 (2): 592-600 (2017)Secure and Traceable Image Transmission Scheme Based on Semitensor Product Compressed Sensing in Telemedicine System., , , и . IEEE Internet Things J., 7 (3): 2432-2451 (2020)A Random Indexing Approach for Web User Clustering and Web Prefetching., , , , и . PAKDD Workshops, том 7104 из Lecture Notes in Computer Science, стр. 40-52. Springer, (2011)Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment., , , и . Secur. Commun. Networks, 9 (11): 1331-1339 (2016)