Author of the publication

A Novel Application of the Phone Card and Its Authentication in Mobile Communications.

, , and . J. Inf. Sci. Eng., 15 (4): 471-484 (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks., and . Comput. J., 58 (4): 934-943 (2015)A new English auction scheme using the bulletin board system., , and . Inf. Manag. Comput. Secur., 17 (5): 408-417 (2009)An improved address ownership in mobile IPv6., , and . Comput. Commun., 31 (14): 3250-3252 (2008)A Robust Remote User Authentication Scheme against Smart Card Security Breach., , , and . DBSec, volume 6818 of Lecture Notes in Computer Science, page 231-238. Springer, (2011)A dynamic identity-based user authentication scheme for remote login systems., , and . Secur. Commun. Networks, 8 (18): 3372-3382 (2015)A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems., , and . J. Medical Systems, 39 (9): 89:1-89:16 (2015)Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme., , , , , and . Future Internet, 15 (3): 99 (March 2023)A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System., , , , and . IEEE Access, (2020)A Dynamic Key Aggregate Cryptosystem in Cloud Environment., , and . IIAI-AAI, page 73-78. IEEE Computer Society, (2015)Cross-Technology Interference Mitigation Using Fully Convolutional Denoising Autoencoders., , , and . GLOBECOM, page 1-6. IEEE, (2020)