Author of the publication

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.

, , , , , , , and . J. Netw. Comput. Appl., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Comparison of Typical Routing Protocols in Ad-hoc Networks., , , , , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 463-473. IOS Press, (2014)Time-variant doppler frequency estimation and compensation for mobile OFDM systems., , and . WCNC, page 1040-1045. IEEE, (2006)Bounds on the spectral radii of digraphs in terms of walks., , and . Appl. Math. Comput., 219 (8): 3721-3728 (2012)Insecurity of a Certificateless Aggregate Signature Scheme., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (2): 660-662 (2016)PiPDR: A Placement-Independent Pedestrian Dead Reckoning System in Mobile Phones., , , and . Ad Hoc Sens. Wirel. Networks, 26 (1-4): 73-96 (2015)A Comparative Survey on RFID Grouping Authentication Protocols., , , , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 982-993. IOS Press, (2014)Target-tracking and path planning for vehicle following in jungle environment., , , , , and . ICARCV, page 455-460. IEEE, (2004)Content-Centric Group User Authentication for Secure Social Networks., , , , and . IEEE Trans. Emerg. Top. Comput., 8 (3): 833-844 (2020)Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage., , , and . IIH-MSP, page 795-798. IEEE, (2014)Symbiotic gut microbes modulate human metabolic phenotypes, , , , , , , , , and 16 other author(s). Proceedings of the National Academy of Sciences, 105 (6): 2117--2122 (Feb 12, 2008)