Author of the publication

A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems.

, , , , , and . J. Medical Systems, 38 (1): 9994 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Affine braid groups: a better platform than braid groups for cryptology?, and . Appl. Algebra Eng. Commun. Comput., 22 (5-6): 375-391 (2011)An analytical model for optimal spectrum leasing under constraints of quality of service in CRNs., , , and . Computer Networks, (2014)Some improved results on communication between information systems., and . Inf. Sci., 180 (18): 3521-3531 (2010)Controlling a chaotic neural network for information processing., , , , , and . Neurocomputing, (2013)A note on diversity criterion in decision making.. Int. J. Intell. Syst., 26 (7): 652-658 (2011)A New Channel Parameter For Cognitive Radio., , , and . CrownCom, page 482-486. IEEE, (2007)A Study of Graph Spectra for Comparing Graphs., and . BMVC, British Machine Vision Association, (2005)Research of E-Business Innovative Training based on CDIO Educational Philosophy., , and . WHICEB, page 73. Association for Information Systems, (2012)A Novel Slack-Stealing Scheduling Algorithm for Hard-Real-Time Multiple-Processors System., , and . CSE, page 714-721. IEEE Computer Society, (2014)Rigorous Punishment Promotes Cooperation in Prisoners' Dilemma Game., , , and . BIONETICS, volume 134 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 312-321. Springer, (2012)