Author of the publication

On security of a more efficient and secure dynamic ID-based remote user authentication scheme.

, , , and . ISDA, page 1371-1375. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System., , , and . IOV, volume 11253 of Lecture Notes in Computer Science, page 278-288. Springer, (2018)A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems., , , and . J. Medical Systems, 40 (11): 233:1-233:10 (2016)An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System., , , , and . Sensors, 17 (7): 1482 (2017)Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol., , and . Int. J. Netw. Secur., 17 (1): 1-6 (2015)Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards., , , , , and . CSS, volume 8300 of Lecture Notes in Computer Science, page 338-348. Springer, (2013)Improving the Security of Non-PKI Methods for Public Key Distribution., and . ITNG, page 1695-1696. IEEE Computer Society, (2009)A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service., , and . ICOIN, page 31-36. IEEE Computer Society, (2015)A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System., , , , and . IEEE Access, (2017)Security and Efficiency Analysis on a Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services., , and . IOV, volume 8662 of Lecture Notes in Computer Science, page 367-375. Springer, (2014)A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period., , and . ICCSA (3), volume 4707 of Lecture Notes in Computer Science, page 273-284. Springer, (2007)