Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced Dynamic Authentication Scheme (EDAS)., , and . Inf. Syst. Frontiers, 16 (1): 113-127 (2014)Smart Kiosk with Gait-Based Continuous Authentication., , , , and . HCI (21), volume 9189 of Lecture Notes in Computer Science, page 188-200. Springer, (2015)Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme., , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 409-415. Springer, (2013)Secure Identity-Based Authentication Scheme Suitable for Limited-Resource Devices., , , and . CIS, page 271-276. IEEE Computer Society, (2016)Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment., , , and . SEC, volume 455 of IFIP Advances in Information and Communication Technology, page 479-494. Springer, (2015)Enhanced Face Authentication With Separate Loss Functions., , and . CoRR, (2023)A Provably Secure User Authentication Scheme Over Unreliable Networks., , , and . AINA (1), volume 449 of Lecture Notes in Networks and Systems, page 602-613. Springer, (2022)Robust Biometrics-Based Remote User Authentication Scheme Using Smart Cards., , and . NBiS, page 384-391. IEEE Computer Society, (2012)Robust Mobile Device Integration of a Fingerprint Biometric Remote Authentication Scheme., , and . AINA, page 678-685. IEEE Computer Society, (2012)Provable user authentication scheme on ECC in multi-server environment., , , , , and . J. Supercomput., 79 (1): 725-761 (2023)