Author of the publication

Robust dynamic ID-based remote user authentication scheme using smart cards.

, , , , and . Int. J. Ad Hoc Ubiquitous Comput., 17 (4): 254-264 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LWTP: An Improved Automatic Image Annotation Method Based on Image Segmentation., , , and . CollaborateCom, volume 252 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 53-62. Springer, (2017)A novel rating prediction method based on user relationship and natural noise., , , and . Multimedia Tools Appl., 77 (4): 4171-4186 (2018)The Influence of Target Layout on Dragging Performance Based on Eye-Control Technique., , , , , , , , , and 1 other author(s). IHSI, volume 903 of Advances in Intelligent Systems and Computing, page 265-270. Springer, (2019)K-hop centrality metric for identifying influential spreaders in dynamic large-scale social networks., , , and . GLOBECOM, page 2954-2959. IEEE, (2014)CodeRepair: PHY-layer partial packet recovery without the pain., , , and . INFOCOM, page 1463-1471. IEEE, (2015)Dynamic switching-based reliable flooding in low-duty-cycle wireless sensor networks., , , and . INFOCOM, page 1393-1401. IEEE, (2013)GMA: An adult account identification algorithm on Sina Weibo using behavioral footprints., , and . Future Gener. Comput. Syst., (2019)Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards., , , , and . J. Netw. Comput. Appl., 34 (1): 73-79 (2011)Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability., , , and . J. Parallel Distributed Comput., 72 (12): 1565-1575 (2012)An efficient indexing and query mechanism for ubiquitous IoT services., , , , and . Int. J. Ad Hoc Ubiquitous Comput., 18 (4): 245-255 (2015)