Author of the publication

On the security of an authentication scheme for multi-server architecture.

, , , and . IJESDF, 5 (3/4): 288-296 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient ID-based multiproxy multisignature without bilinear maps in ROM., , and . Annales des Télécommunications, 68 (3-4): 231-237 (2013)A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography., and . Security and Communication Networks, 5 (11): 1260-1266 (2012)Identity-based Digital Signature Scheme Without Bilinear Pairings., , and . IACR Cryptology ePrint Archive, (2011)Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error., , , and . IACR Cryptology ePrint Archive, (2017)Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol., , , and . J. Medical Systems, 38 (10): 116 (2014)Secure Key Agreement and Key Protection for Mobile Device User Authentication., , , and . IEEE Trans. Information Forensics and Security, 14 (2): 319-330 (2019)Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud., , and . IEEE Trans. Information Forensics and Security, 11 (6): 1165-1176 (2016)Efficient and provably-secure certificateless signature scheme without bilinear pairings., , and . IACR Cryptology ePrint Archive, (2010)Efficient revocable ID-based encryption with cloud revocation server., , , and . Int. J. Communication Systems, (2018)Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries., , , , and . IEEE Trans. Smart Grid, 8 (5): 2411-2419 (2017)