Author of the publication

On security of a more efficient and secure dynamic ID-based remote user authentication scheme.

, , , and . ISDA, page 1371-1375. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Approach Combining Rule-Based and Anomaly-Based Detection Against DDoS Attacks, and . International Journal of Network Security & Its Applications, 8 (8): 1-18 (September 2016)Improve Two Remote User Authentication Scheme Using Smart Card., , and . BWCCA, page 404-407. IEEE, (2013)Design of a fair proxy raffle protocol on the Internet., , and . Comput. Stand. Interfaces, 27 (4): 415-422 (2005)A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System., , , , and . IEEE Access, (2020)A secure payment system for multimedia on demand on mobile VANET clouds., , , and . Secur. Commun. Networks, 9 (17): 4378-4390 (2016)The design of a secure anonymous Internet voting system., , and . Comput. Secur., 23 (4): 330-337 (2004)Neurofeedback based attention training for children with ADHD., , , and . iCAST, page 93-97. IEEE, (2017)Performance Evaluation of Active Queue Management Using A Hybrid Approach., and . J. Comput., 7 (5): 1196-1203 (2012)A Traceable Online Will System Based on Blockchain and Smart Contract Technology., , , , , and . Symmetry, 13 (3): 466 (2021)Authorized Shared Electronic Medical Record System with Proxy Re-Encryption and Blockchain Technology., , , , , and . Sensors, 21 (22): 7765 (2021)