Author of the publication

A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

, , , and . J. Medical Systems, 40 (1): 12:1-12:6 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ID-Based Deniable Threshold Ring Authentication., , , and . HPCC/CSS/ICESS, page 1779-1784. IEEE, (2015)Estimating Nitrogen Status of Plant by Vis/NIR Spectroscopy and Mathematical Model., , , , and . ICNC (3), page 612-616. IEEE Computer Society, (2009)Study on an Advanced Treatment of Domestic Wastewater by Bio-filtration and Water-Quality Measurement System., , , and . ICNC (3), page 644-648. IEEE Computer Society, (2009)Efficient and Short Identity-Based Deniable Authenticated Encryption., and . ICCCS (2), volume 10603 of Lecture Notes in Computer Science, page 244-255. Springer, (2017)Efficient forward secure identity-based shorter signature from lattice., , , and . Computers & Electrical Engineering, 40 (6): 1963-1971 (2014)A novel certificateless deniable authentication protocol., , , , and . IACR Cryptology ePrint Archive, (2013)A post-quantum communication secure identity-based proxy-signcryption scheme., , , and . IJESDF, 7 (2): 147-165 (2015)Identity-based deniable authenticated encryption and its application to e-mail system., , and . Telecommunication Systems, 62 (4): 625-639 (2016)Certificateless online/offline signcryption for the Internet of Things., , and . Wireless Networks, 23 (1): 145-158 (2017)Identity-based Deniable Authenticated Encryption for E-voting Systems., , , , and . TIIS, 13 (6): 3299-3315 (2019)