Author of the publication

A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems.

, , , , , and . J. Medical Systems, 38 (1): 9994 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols, , , , and . CoRR, (2013)An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems., , , , and . J. Medical Systems, 39 (3): 20 (2015)An Interactive Colour Line Recognition System for Seismic Section Digitisation., and . MVA, page 223-226. (1990)Implementation for noise suppression in images., and . Image Vision Comput., 4 (1): 29-37 (1986)Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System., , , , , , and . Wireless Personal Communications, 106 (2): 719-738 (2019)Cryptanalysis and improvement of a certificateless encryption scheme in the standard model., , , and . Frontiers of Computer Science, 8 (1): 163-173 (2014)An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network., , , and . Computer Communications, 35 (2): 188-195 (2012)A novel privacy preserving keyword searching for cloud storage., , , and . PST, page 77-81. IEEE, (2013)On the 2-Adic Complexity of Periodic Binary Sequences., , , and . IEICE Transactions, 95-A (1): 367-371 (2012)Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation., , , , , , and . Symmetry, 11 (2): 272 (2019)