Author of the publication

A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography.

, , , and . Telecommun. Syst., 29 (3): 165-180 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks., and . Comput. J., 58 (4): 934-943 (2015)A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems., , and . J. Medical Systems, 39 (9): 89:1-89:16 (2015)An improved address ownership in mobile IPv6., , and . Comput. Commun., 31 (14): 3250-3252 (2008)A new English auction scheme using the bulletin board system., , and . Inf. Manag. Comput. Secur., 17 (5): 408-417 (2009)A Robust Remote User Authentication Scheme against Smart Card Security Breach., , , and . DBSec, volume 6818 of Lecture Notes in Computer Science, page 231-238. Springer, (2011)A dynamic identity-based user authentication scheme for remote login systems., , and . Secur. Commun. Networks, 8 (18): 3372-3382 (2015)A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System., , , , and . IEEE Access, (2020)Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme., , , , , and . Future Internet, 15 (3): 99 (March 2023)Cross-Technology Interference Mitigation Using Fully Convolutional Denoising Autoencoders., , , and . GLOBECOM, page 1-6. IEEE, (2020)A Dynamic Key Aggregate Cryptosystem in Cloud Environment., , and . IIAI-AAI, page 73-78. IEEE Computer Society, (2015)