Author of the publication

Cryptanalysis and Enhancement of an Anonymous Self-Certified Key Exchange Protocol.

, , and . Wirel. Pers. Commun., 99 (2): 863-891 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Light Weight Three Factor based Authentication Scheme for Multi-server Environment using Smart Cards., , and . ICCNS, page 43-47. ACM, (2017)A Convertible Designated Verifible Blind Multi-signcryption Scheme., , and . ACC (4), volume 193 of Communications in Computer and Information Science, page 549-556. Springer, (2011)An efficient three-factor user authentication scheme for industrial wireless sensor network with fog computing., , and . Int. J. Commun. Syst., (2022)Chaotic Map based Privacy Preservation User Authentication Scheme for WBANs., and . TENCON, page 1037-1042. IEEE, (2019)A novel time-stamped signature scheme based upon DLP., , and . RAIT, page 6-10. IEEE, (2012)An ID-based Non-Interactive Deniable Authentication Protocol based on ECC., , and . ICCNS, page 48-52. ACM, (2017)A Lightweight Biometric-based Authentication Scheme for Telecare Medicine Information Systems Using ECC., and . ICCCNT, page 1-6. IEEE, (2018)Cloud-Assisted Privacy Preserving Authentication Scheme for Telecare Medical Information Systems., and . ANTS, page 1-6. IEEE, (2018)BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications., , , , , and . Comput., 5 (4): 32 (2016)A Secure Privacy Preserving Authentication Schema for Remote Server Using Biometric., , and . ICCSE (1), volume 1811 of Communications in Computer and Information Science, page 324-336. Springer, (2022)