Author of the publication

PSAK: A provably secure authenticated key agreement scheme based on extended Chebyshev chaotic maps for smart grid environments.

, , , , , , and . Trans. Emerg. Telecommun. Technol., (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy-Efficient Algorithm for Broadcasting in Ad Hoc Wireless Sensor Networks., , , and . Sensors, 13 (4): 4922-4946 (2013)A secure model for controlling the hubs in P2P wireless network based on trust value., , , , , and . Comput. Commun., 33 (8): 997-1004 (2010)VMPlanner: Optimizing virtual machine placement and traffic flow routing to reduce network power costs in cloud data centers., , , , and . Comput. Networks, 57 (1): 179-196 (2013)A Survey on Steiner Tree Construction and Global Routing for VLSI Design., , , and . IEEE Access, (2020)On Designing a Novel PI Controller for AQM Routers Supporting TCP Flows., , , , and . APWeb, volume 3399 of Lecture Notes in Computer Science, page 991-1002. Springer, (2005)A General Real-Time Control Approach of Intrusion Response for Industrial Automation Systems., , , , , and . IEEE Trans. Syst. Man Cybern. Syst., 46 (8): 1021-1035 (2016)A Class of General Transient Faults Propagation Analysis for Networked Control Systems., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 45 (4): 647-661 (2015)Modeling and Analysis of the Execution Context in WS-BPEL., , , , and . CSA, page 1-6. IEEE, (2009)A general effective rate control system based on matching measurement and inter-quantizer., , , , and . Inf. Sci., (2016)An improved competitive particle swarm optimization for many-objective optimization problems., , , and . Expert Syst. Appl., (2022)