Author of the publication

An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre.

, , , , and . The Journal of Supercomputing, 72 (4): 1623-1644 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Irshad, Azeem
add a person with the name Irshad, Azeem
 

Other publications of authors with the same name

An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment., , , , , and . Int. J. Communication Systems, (2018)An improved and secure chaotic map based authenticated key agreement in multi-server architecture., , , , , and . Multimedia Tools Appl., 77 (1): 1167-1204 (2018)An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre., , , , and . The Journal of Supercomputing, 72 (4): 1623-1644 (2016)An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre., , , , , , and . IEEE Systems Journal, 13 (1): 436-446 (2019)A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme., , , , , and . Security and Communication Networks, 7 (8): 1210-1218 (2014)Extended state space recursive least squares., , , and . Digital Signal Processing, (2016)Ranked Sense Multiple Access Control Protocol for Multichannel Cognitive Radio-Based IoT Networks., , , , , , , and . Sensors, 19 (7): 1703 (2019)Skill Specific Spoken Dialogues Based Personalized ATM Design to Maximize Effective Interaction for Visually Impaired Persona., , , , , , and . HCI (11), volume 8520 of Lecture Notes in Computer Science, page 446-457. Springer, (2014)Comment on 'ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications'., and . IET Networks, 10 (5): 244-245 (2021)A secure mutual authenticated key agreement of user with multiple servers for critical systems., , , , , , and . Multimedia Tools Appl., 77 (9): 11067-11099 (2018)