Author of the publication

A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.

, , , and . J. Medical Systems, 40 (11): 230:1-230:13 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bio-chaotic Stream Cipher-Based Iris Image Encryption., , , and . CSE (2), page 739-744. IEEE Computer Society, (2009)Spam Trapping System: Novel security framework to fight against spam botnets., , , , and . ICT, page 467-471. IEEE, (2014)Polymorphic Malware Detection Using Hierarchical Hidden Markov Model., , and . DASC, page 151-155. IEEE Computer Society, (2011)Information Security Awareness Campaign: An Alternate Approach., , and . ISA, volume 200 of Communications in Computer and Information Science, page 1-10. Springer, (2011)Cryptanalysis of a key agreement protocol based on chaotic Hash., and . IJESDF, 5 (3/4): 172-177 (2013)Guest editorial for special issue on biometric systems and applications.. Telecommunication Systems, 47 (3-4): 183-184 (2011)A hybrid particle swarm optimization algorithm for high-dimensional problems., , , and . Computers & Industrial Engineering, 61 (4): 1117-1122 (2011)A hybrid forecasting model for enrollments based on aggregated fuzzy time series and particle swarm optimization., , , , , , , and . Expert Syst. Appl., 38 (7): 8014-8023 (2011)Using Sorted Switching Median Filter to remove high-density impulse noises., , , , , , and . J. Visual Communication and Image Representation, 24 (7): 956-967 (2013)Mutual funds trading strategy based on particle swarm optimization., , , , , , , , and . Expert Syst. Appl., 38 (6): 7582-7602 (2011)