Author of the publication

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks.

, , , , , and . Comput. Networks, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Internet of Things: A Review of Enabled Technologies and Future Challenges., , , , , , and . IEEE Access, (2019)Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks., , , , , and . Comput. Networks, (2016)Steganalysis for palette-based images using generalized difference image and color correlogram., , and . Signal Process., 91 (11): 2595-2605 (2011)An efficient wavelet-tree-based watermarking method., , , , , and . Expert Syst. Appl., 38 (12): 14357-14366 (2011)A blockchain-based conditional privacy-preserving authentication scheme for edge computing services., , , , and . J. Inf. Secur. Appl., (2022)Improvement of the Efficient Secret Broadcast Scheme., , and . IEICE Trans. Inf. Syst., 93-D (12): 3396-3399 (2010)Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts., , , , and . IEEE Access, (2017)Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities., , , and . Comput. Sci. Inf. Syst., 16 (1): 1-17 (2019)A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity., , , , , and . Secur. Commun. Networks, 9 (15): 2643-2655 (2016)A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata., , , and . J. Netw. Comput. Appl., 36 (1): 235-248 (2013)