Author of the publication

DOTP-AaaS: Dynamic One Time Password Matching-Based Authentication as a Service.

, , and . CSA/CUTE, volume 474 of Lecture Notes in Electrical Engineering, page 962-966. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extraction of enhanced evoked potentials using wavelet filtering., , , and . Multimedia Tools Appl., 63 (1): 45-61 (2013)Scenario-Based Digital Forensics Challenges in Cloud Computing., , and . Symmetry, 8 (10): 107 (2016)VBSM: VCC-Based Black Box Service Model with Enhanced Data Integrity., , and . Information, 5 (4): 526-534 (2014)Multi-path transmission control scheme combining bandwidth aggregation and packet scheduling for real-time streaming in multi-path environment., , , and . IET Commun., 4 (8): 937-945 (2010)Efficient localization scheme with ring overlapping by utilizing mobile anchors in wireless sensor networks., , , , and . ACM Trans. Embed. Comput. Syst., 12 (2): 20:1-20:18 (2013)Design of Secure Protocol for Session Key Exchange in Vehicular Cloud Computing., and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 249-254. Springer, (2015)A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform., , and . Sensors, 16 (7): 1036 (2016)The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart Phone., , , and . ITCS, volume 180 of Lecture Notes in Electrical Engineering, page 171-178. Springer, (2012)Design and implementation of light-weight mobile multicast for fast MIPv6., , , , and . Comput. Commun., 32 (3): 552-559 (2009)A secure model for controlling the hubs in P2P wireless network based on trust value., , , , , and . Comput. Commun., 33 (8): 997-1004 (2010)