Author of the publication

Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks.

, , , and . KSII Trans. Internet Inf. Syst., 10 (3): 1273-1288 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Finite-Time Lag Synchronization of Memristive Neural Networks With Multi-Links via Adaptive Control., , , , and . IEEE Access, (2020)Adaptive synchronization of memristor-based BAM neural networks with mixed delays., , , and . Appl. Math. Comput., (2018)Chaotic Ant Swarm., , , and . ICNC (3), page 446-450. IEEE Computer Society, (2007)A secure and efficient mutual authentication scheme for session initiation protocol., , , and . Peer-to-Peer Netw. Appl., 9 (2): 449-459 (2016)Fishers Harvest Parallel Unlearning in Inherited Model Networks., , , , , , , and . CoRR, (2024)An Efficient Image Privacy Preservation Scheme for Smart City Applications Using Compressive Sensing and Multi-Level Encryption., , , and . IEEE Trans. Intell. Transp. Syst., 25 (10): 14958-14972 (October 2024)Finite-time synchronization of memristor-based neural networks with mixed delays., , , , and . Neurocomputing, (2017)TFHSVul: A Fine-Grained Hybrid Semantic Vulnerability Detection Method Based on Self-Attention Mechanism in IoT., , , , , , , and . IEEE Internet Things J., 12 (1): 30-44 (January 2025)Resilient and Redactable Blockchain With Two-Level Rewriting and Version Detection., , , , , and . IEEE Trans. Inf. Forensics Secur., (2025)A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme., , , , , and . J. Inf. Secur. Appl., (June 2023)