Author of the publication

A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs.

, , and . Comput. Networks, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An anonymous and robust multi-server authentication protocol using multiple registration servers., , , , and . Int. J. Commun. Syst., (2017)A provably secure biometrics-based authenticated key agreement scheme for multi-server environments., , , , , , and . Multim. Tools Appl., 77 (2): 2359-2389 (2018)A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments., , , , , and . Secur. Commun. Networks, 9 (17): 4650-4666 (2016)Clustering-based Optimal Resource Allocation Strategy in Title Insurance Underwriting., , , and . CITS, page 1-5. IEEE, (2022)Machine Learning-based Currency Information Retrieval for Aiding the Visually Impaired People., , , , and . CITS, page 1-5. IEEE, (2021)Design of an enhanced authentication protocol and its verification using AVISPA., , , and . RAIT, page 404-409. IEEE, (2016)Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings., and . Comput. J., 58 (10): 2636-2648 (2015)A Post Dynamic Clustering Approach for Classification-based Image Retrieval., , , and . CCCI, page 1-7. IEEE, (2020)An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks., , , and . J. Netw. Comput. Appl., (2018)Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys., and . Wireless Personal Communications, 82 (4): 2727-2750 (2015)