Author of the publication

A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography.

, , , , and . Multimedia Tools Appl., 74 (10): 3477-3488 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quality evaluation and best service choice for cloud computing based on user preference and weights of attributes using the analytic network process., and . Electron. Commer. Res., 14 (3): 245-270 (2014)An ANP-Based Practical Quality Model for a Secure Embedded System with Sensor Network., , and . IJDSN, (2014)Topic Map Based Management System for Social Network Service., and . FGIT, volume 7709 of Lecture Notes in Computer Science, page 119-126. Springer, (2012)Service based AEHS for human centric learning environments., and . J. Ambient Intell. Smart Environ., 7 (2): 231-242 (2015)Cloud computing-based jam management for a manufacturing system in a Green IT environment., and . J. Supercomput., 69 (3): 1054-1067 (2014)Relative weight comparison between virtual key factors of cloud computing with analytic network process., , , , and . J. Supercomput., 72 (5): 1694-1714 (2016)A secure smart-work service model based OpenStack for Cloud computing., , , , and . Clust. Comput., 17 (3): 691-702 (2014)A study on VAL platform for 5G network for large-capacity data transmission., and . J. Supercomput., 77 (10): 10791-10803 (2021)English course E-learning system based on relative item difficulty using web component composition., , , and . Multim. Tools Appl., 61 (1): 225-241 (2012)Ubiquitous Context-Awareness and Wireless Sensor Networks., , , and . Int. J. Distributed Sens. Networks, (2014)