Author of the publication

ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications.

, , , , and . IET Networks, 8 (5): 289-298 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Difference Expansion., , and . Int. J. Netw. Secur., 18 (4): 633-643 (2016)An Ideal and Perfect (t, n) Multi-secret Sharing Scheme Based on Finite Geometry., and . ICITAM, volume 699 of Advances in Intelligent Systems and Computing, page 85-94. Springer, (2017)Cluster-Based Energy-Efficient Secure Routing in Wireless Sensor Networks., , and . ICITAM, volume 699 of Advances in Intelligent Systems and Computing, page 23-40. Springer, (2017)ES3B: Enhanced Security System for Smart Building Using IoT., , , , , and . SmartCloud, page 158-165. IEEE, (2018)Cryptanalysis and Improvement of Das et al.'s Proxy Signature Scheme., and . ICIT, page 151-154. IEEE Computer Society, (2007)SecHealth: An Efficient Fog Based Sender Initiated Secure Data Transmission of Healthcare Sensors for e-Medical System., , and . GLOBECOM, page 1-6. IEEE, (2017)A robust authentication and access control protocol for securing wireless healthcare sensor networks., , , , , and . J. Inf. Secur. Appl., (2020)A Geometric-Based User Authentication Scheme for Multi-server Architecture: Cryptanalysis and Enhancement., and . ICMC, volume 1262 of Advances in Intelligent Systems and Computing, page 15-27. Springer, (2020)Weighted Matrix-Based Random Data Hiding Scheme Within a Pair of Interpolated Image., , , and . ICMC, volume 1262 of Advances in Intelligent Systems and Computing, page 89-102. Springer, (2020)Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart Cards., and . ISECS, page 355-361. IEEE Computer Society, (2008)