Author of the publication

A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design.

, , , , , and . Wireless Personal Communications, 85 (1): 263-288 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust dynamic ID-based remote user authentication scheme using smart cards., , , , and . IJAHUC, 17 (4): 254-264 (2014)Intrusion Detection Using Ensemble of SVM Classifiers., , , and . FSKD (4), page 45-49. IEEE Computer Society, (2007)0-7695-2874-0.Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles., , , and . CANS, volume 3810 of Lecture Notes in Computer Science, page 334-348. Springer, (2005)Security Analysis of NSSK Protocol and its Improvement., , and . DASC, page 115-118. IEEE Computer Society, (2009)An enhanced smart card based remote user password authentication scheme., , , and . J. Network and Computer Applications, 36 (5): 1365-1371 (2013)Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update., , , and . Int. J. Communication Systems, 28 (2): 374-382 (2015)Modeling Chinese Wall Policy Using Colored Petri Nets., , and . CIT, page 162. IEEE Computer Society, (2006)An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture., , , , and . Wireless Personal Communications, 80 (1): 175-192 (2015)A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things., , , , , and . IEEE Internet of Things Journal, 5 (3): 1606-1615 (2018)Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards., , , and . ISBAST, IEEE, (2013)