Author of the publication

A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.

, , , , , and . Secur. Commun. Networks, 9 (15): 2643-2655 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments., , , , , , , and . IEEE Access, (2020)Safety and security of autonomous vehicles., , , and . Trans. Emerg. Telecommun. Technol., (November 2023)A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity., , , , , and . Secur. Commun. Networks, 9 (15): 2643-2655 (2016)An approach for solving fully fuzzy multi-objective linear fractional optimization problems., , , and . Soft Comput., 24 (12): 9105-9119 (2020)Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments., , , and . Sensors, 22 (10): 3858 (2022)Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems., , , , and . J. Medical Syst., 38 (6): 24 (2014)An elliptic curve cryptography based lightweight authentication scheme for smart grid communication., , , , , and . Future Gener. Comput. Syst., (2018)A survey on Attribute-Based Signatures., , , and . J. Syst. Archit., (2022)Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device., , , and . BICS, volume 7888 of Lecture Notes in Computer Science, page 271-277. Springer, (2013)Further cryptanalysis of 'A remote authentication scheme using mobile device'., , and . CASoN, page 234-237. IEEE, (2012)