Author of the publication

Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks.

, , , and . KSII Trans. Internet Inf. Syst., 10 (3): 1273-1288 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure and efficient mutual authentication scheme for session initiation protocol., , , and . Peer-to-Peer Netw. Appl., 9 (2): 449-459 (2016)Chaotic Ant Swarm., , , and . ICNC (3), page 446-450. IEEE Computer Society, (2007)Finite-Time Lag Synchronization of Memristive Neural Networks With Multi-Links via Adaptive Control., , , , and . IEEE Access, (2020)Adaptive synchronization of memristor-based BAM neural networks with mixed delays., , , and . Appl. Math. Comput., (2018)Finite-time synchronization of memristor-based neural networks with mixed delays., , , , and . Neurocomputing, (2017)TFHSVul: A Fine-Grained Hybrid Semantic Vulnerability Detection Method Based on Self-Attention Mechanism in IoT., , , , , , , and . IEEE Internet Things J., 12 (1): 30-44 (January 2025)An Efficient Image Privacy Preservation Scheme for Smart City Applications Using Compressive Sensing and Multi-Level Encryption., , , and . IEEE Trans. Intell. Transp. Syst., 25 (10): 14958-14972 (October 2024)Resilient and Redactable Blockchain With Two-Level Rewriting and Version Detection., , , , , and . IEEE Trans. Inf. Forensics Secur., (2025)Fishers Harvest Parallel Unlearning in Inherited Model Networks., , , , , , , and . CoRR, (2024)Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid., , , , and . IEEE Syst. J., 15 (1): 395-406 (2021)