Author of the publication

Cloud-based radio frequency identification authentication protocol with location privacy protection.

, , , and . IJDSN, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TrustR: An Integrated Router Security Framework for Protecting Computer Networks., , and . IEEE Communications Letters, 20 (2): 376-379 (2016)Cloud-based radio frequency identification authentication protocol with location privacy protection., , , and . IJDSN, (2018)A Trust Management System for Securing Data Plane of Ad-Hoc Networks., , and . IEEE Trans. Vehicular Technology, 65 (9): 7579-7592 (2016)An Efficient Trusted Mobile Router Selection Mechanism for Multihomed NEMO Network., , and . CyberC, page 14-18. IEEE Computer Society, (2014)RCCA Security for KEM+DEM Style Hybrid Encryptions., and . Inscrypt, volume 7763 of Lecture Notes in Computer Science, page 102-121. Springer, (2012)Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm., and . Security and Communication Networks, 8 (18): 3323-3334 (2015)RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions., and . Security and Communication Networks, 7 (8): 1219-1231 (2014)Natural sd-RCCA Secure Public-Key Encryptions., , and . ProvSec, volume 10592 of Lecture Notes in Computer Science, page 236-250. Springer, (2017)Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms., , , , and . J. UCS, 25 (3): 158-181 (2019)A Dynamic Layering Scheme of Multicast Key Management., , , and . IAS, page 269-272. IEEE Computer Society, (2009)