Author of the publication

Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks.

, , , and . I. J. Network Security, 18 (5): 816-831 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Similar Image Retrieval Based on Wavelet Transformation., , and . IJWMIP, 2 (2): 111-120 (2004)A Fast and Secure Scheme for Data Outsourcing in the Cloud., , and . TIIS, 8 (8): 2708-2722 (2014)An Image Encryption Scheme Based on Concatenated Torus Automorphisms., , and . TIIS, 7 (6): 1492-1511 (2013)Spatial Similarity Retrieval in Video Databases., and . J. Visual Communication and Image Representation, 12 (2): 107-122 (2001)Lossless recovery of a VQ index table with embedded secret data., , and . J. Visual Communication and Image Representation, 18 (3): 207-216 (2007)A steganographic scheme by fully exploiting modification directions., and . Expert Syst. Appl., 38 (8): 10648-10657 (2011)Nucleus and cytoplast contour detector from a cervical smear image., , and . Expert Syst. Appl., 39 (1): 154-161 (2012)Path Planning for Racing Games., , , and . International Journal on Artificial Intelligence Tools, 19 (5): 679-702 (2010)A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression., and . Softw., Pract. Exper., 21 (1): 35-49 (1991)Efficient authentication protocols of GSM., , and . Computer Communications, 28 (8): 921-928 (2005)