From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An anonymous and robust multi-server authentication protocol using multiple registration servers., , , , и . Int. J. Commun. Syst., (2017)A provably secure biometrics-based authenticated key agreement scheme for multi-server environments., , , , , , и . Multim. Tools Appl., 77 (2): 2359-2389 (2018)A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments., , , , , и . Secur. Commun. Networks, 9 (17): 4650-4666 (2016)Clustering-based Optimal Resource Allocation Strategy in Title Insurance Underwriting., , , и . CITS, стр. 1-5. IEEE, (2022)Machine Learning-based Currency Information Retrieval for Aiding the Visually Impaired People., , , , и . CITS, стр. 1-5. IEEE, (2021)Design of an enhanced authentication protocol and its verification using AVISPA., , , и . RAIT, стр. 404-409. IEEE, (2016)Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings., и . Comput. J., 58 (10): 2636-2648 (2015)A Post Dynamic Clustering Approach for Classification-based Image Retrieval., , , и . CCCI, стр. 1-7. IEEE, (2020)An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks., , , и . J. Netw. Comput. Appl., (2018)Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys., и . Wireless Personal Communications, 82 (4): 2727-2750 (2015)