Author of the publication

A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking.

, , , and . Security and Management, page 179-183. CSREA Press, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Issues and Challenges for Cyber Physical System., , , , , and . GreenCom/CPSCom, page 733-738. IEEE Computer Society, (2010)Towards Time-Bound Hierarchical Key Management in Cloud Computing., , , , and . ECC (1), volume 297 of Advances in Intelligent Systems and Computing, page 31-38. Springer, (2014)Joint-learning segmentation in Internet of drones (IoD)-based monitor systems., , , , and . Comput. Commun., (2020)Weaving rewrite-based access control policies., , , and . FMSE, page 71-80. ACM, (2007)An Efficient and Secure Key Establishment Scheme for Wireless Sensor Network., and . IITSI, page 511-516. IEEE Computer Society, (2010)Analyzing Selfish Behavior in Opportunistic Networks., , , and . ISPAN-FCST-ISCC, page 218-225. IEEE Computer Society, (2017)A New Graphical Representation of Protein Sequences Based on Dual-Vector Model., , , and . BIC-TA, volume 472 of Communications in Computer and Information Science, page 629-632. Springer, (2014)A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids., , , , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 40-56. Springer, (2016)Attacks and Solutions of a Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications., , , , and . ICGEC, volume 579 of Advances in Intelligent Systems and Computing, page 191-198. Springer, (2017)Incentive evolutionary game model for opportunistic social networks., , , , , and . Future Gener. Comput. Syst., (2020)