Author of the publication

EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment.

, , , , , , and . Peer-to-Peer Netw. Appl., 15 (5): 2179-2198 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Conditional Privacy-Preserving Authentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks., , , and . KSII Trans. Internet Inf. Syst., 13 (12): 6121-6144 (2019)Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment., , , , , , and . BigDataSecurity/HPSC/IDS, page 146-151. IEEE, (2016)Authentication and Revocation Scheme for VANETs Based on Chinese Remainder Theorem., , , , and . HPCC/SmartCity/DSS, page 1541-1547. IEEE, (2019)Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing., , , and . CGC, page 282-289. IEEE Computer Society, (2012)Towards Privacy Preserving Mining over Distributed Cloud Databases., , , and . CGC, page 130-136. IEEE Computer Society, (2012)Encrypted Remote User Authentication Scheme by Using Smart Card., , , and . WISM, volume 7529 of Lecture Notes in Computer Science, page 314-323. Springer, (2012)Approximate Keyword-based Search over Encrypted Cloud Data., , , and . ICEBE, page 238-245. IEEE Computer Society, (2012)Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data., , , and . APSCC, page 263-270. IEEE Computer Society, (2012)Flexible and Efficient Authentication of IoT Cloud Scheme Using Crypto Hash Function., , and . CSAI/ICIMT, page 487-494. ACM, (2018)Omicron virus emotions understanding system based on deep learning architecture., , , and . J. Ambient Intell. Humaniz. Comput., 14 (7): 9497-9507 (July 2023)