Author of the publication

A simple and efficient authentication scheme for mobile satellite communication systems.

, , and . Int. J. Satell. Commun. Netw., 30 (1): 29-38 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems., , , and . J. Medical Systems, 40 (11): 233:1-233:10 (2016)An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System., , , , and . Sensors, 17 (7): 1482 (2017)Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol., , and . Int. J. Netw. Secur., 17 (1): 1-6 (2015)A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System., , , and . IOV, volume 11253 of Lecture Notes in Computer Science, page 278-288. Springer, (2018)Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards., , , , , and . CSS, volume 8300 of Lecture Notes in Computer Science, page 338-348. Springer, (2013)A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service., , and . ICOIN, page 31-36. IEEE Computer Society, (2015)Improving the Security of Non-PKI Methods for Public Key Distribution., and . ITNG, page 1695-1696. IEEE Computer Society, (2009)A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System., , , , and . IEEE Access, (2017)A simple and efficient authentication scheme for mobile satellite communication systems., , and . Int. J. Satell. Commun. Netw., 30 (1): 29-38 (2012)An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity., , , and . KSII Trans. Internet Inf. Syst., 7 (1): 119-131 (2013)