Author of the publication

An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre.

, , , , , , and . IEEE Systems Journal, 13 (1): 436-446 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Irshad, Azeem
add a person with the name Irshad, Azeem
 

Other publications of authors with the same name

An improved lightweight multiserver authentication scheme., , , , , and . Int. J. Communication Systems, (2017)A secure mutual authenticated key agreement of user with multiple servers for critical systems., , , , , , and . Multimedia Tools Appl., 77 (9): 11067-11099 (2018)Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment., , , , and . IACR Cryptology ePrint Archive, (2015)Self-Citation Analysis on Google Scholar Dataset for H-Index Corrections., , , , , , , , , and . IEEE Access, (2019)An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment., , , , , and . Int. J. Communication Systems, (2018)An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre., , , , and . The Journal of Supercomputing, 72 (4): 1623-1644 (2016)An improved and secure chaotic map based authenticated key agreement in multi-server architecture., , , , , and . Multimedia Tools Appl., 77 (1): 1167-1204 (2018)An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre., , , , , , and . IEEE Systems Journal, 13 (1): 436-446 (2019)Extended state space recursive least squares., , , and . Digital Signal Processing, (2016)A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme., , , , , and . Security and Communication Networks, 7 (8): 1210-1218 (2014)