Author of the publication

Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things.

, , , , , and . SocialSec, volume 1095 of Communications in Computer and Information Science, page 95-109. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Common pattern of population decline for freshwater cetacean species in deteriorating habitats, , , , and . Freshwater Biology, 57 (6): 1266--1276 (March 2012)CSIID: WiFi-based Human Identification via Deep Learning., , , and . ICCSE, page 326-330. IEEE, (2019)Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards., and . ISC, volume 7807 of Lecture Notes in Computer Science, page 221-237. Springer, (2013)The application of Han Dynasty cultural elements to modern product design., , , , and . ICAC, page 79-82. IEEE, (2014)The Emperor's New Password Creation Policies: An Evaluation of Leading Web Services and the Effect of Role in Resisting Against Online Guessing., and . ESORICS (2), volume 9327 of Lecture Notes in Computer Science, page 456-477. Springer, (2015)Constrained total least squares localization using angle of arrival and time difference of arrival measurements in the presence of synchronization clock bias and sensor position errors., , , and . IJDSN, (2019)Cookie-Proxy: A Scheme to Prevent SSLStrip Attack., , , , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 365-372. Springer, (2012)xDFT: An Extensible Dynamic Fault Tolerance Model for Cooperative System., , , and . APWeb Workshops, volume 3842 of Lecture Notes in Computer Science, page 555-559. Springer, (2006)Evolutionary Game Analysis of Pollutant Abatement with Collective-Risk., , and . IEEM, page 6-13. IEEE, (2019)On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions., and . Comput. Networks, (2014)