Author of the publication

Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks.

, , and . Secur. Commun. Networks, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CPU frequency scheduling of real-time applications on embedded devices with temporal encoding-based deep reinforcement learning., and . J. Syst. Archit., (September 2023)Impact of Managerial Commitment on Risk Taking with Dynamic Fund Flows., , and . Manag. Sci., 65 (7): 3174-3195 (2019)Anomaly Detection of Target Dynamics Based on Clustering., , and . I-SPAN, page 287-291. IEEE, (2018)Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks., , and . Secur. Commun. Networks, (2017)A Formal Method for Safety Time Series Simulation of Aerospace., , and . ICAIS (1), volume 12239 of Lecture Notes in Computer Science, page 38-48. Springer, (2020)Multi-scale visualization based on sketch interaction for massive surveillance video data., , , , , , , and . Pers. Ubiquitous Comput., 25 (6): 1027-1037 (2021)Constraint Abstraction in Verification of Security Protocols., , , and . FAW, volume 5059 of Lecture Notes in Computer Science, page 252-263. Springer, (2008)Interactive Animation Editing Based on Sketch Interaction., , , , and . Monterey Workshop, volume 10228 of Lecture Notes in Computer Science, page 77-86. Springer, (2016)An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming., , , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 166-180. Springer, (2007)SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming., , and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 125-140. Springer, (2008)