Author of the publication

A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

, , , and . J. Medical Systems, 40 (1): 12:1-12:6 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Free gait generation based on discretization for a hexapod robot., , , and . ROBIO, page 2334-2338. IEEE, (2013)Transcriptomics and Proteomics in the Study of H1N1 2009., , , , and . Genomics, Proteomics & Bioinformatics, 8 (3): 139-144 (2010)An Efficient Provable Secure Public Auditing Scheme for Cloud Storage., , , , and . TIIS, 8 (11): 4226-4241 (2014)Enabling identity-based cloud storage public auditing with quantum computers resistance., , and . IJESDF, 8 (1): 82-98 (2016)Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks., , and . IJDSN, (2015)"Doctors Do Too Little Technology": A Longitudinal Field Study of an Electronic Healthcare System Implementation., , and . Information Systems Research, 22 (3): 523-546 (2011)PPAM: Privacy-preserving Attributes Matchmaking Protocol for Mobile Social Networks Secure against Malicious Users., , and . I. J. Network Security, 18 (4): 625-632 (2016)New Stability Criteria of Discrete Systems With Time-Varying Delays., , , , , and . IEEE Access, (2019)A Puncturing Algorithm for Mixing 2-Kernel and 3-Kernel Polar Codes., , , , and . WISATS (2), volume 281 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 323-332. Springer, (2019)Cryptanalysis of an integrity checking scheme for cloud data sharing., , , , and . J. Inf. Secur. Appl., (2015)