Author of the publication

A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

, , , and . J. Medical Systems, 40 (1): 12:1-12:6 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of an Identity Based Signcryption without Random Oracles., , and . Fundam. Inform., 107 (1): 105-109 (2011)An Improved Certificateless Signature Scheme Secure in the Standard Model., , and . Fundam. Inform., 88 (1-2): 193-206 (2008)A Lightweight Certificateless User Authentication Scheme for Mobile Environment., , , , and . ML4CS, volume 11806 of Lecture Notes in Computer Science, page 112-122. Springer, (2019)Analysis of an ABE Scheme with Verifiable Outsourced Decryption., , , , and . Sensors, 18 (1): 176 (2018)An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme., and . IACR Cryptology ePrint Archive, (2008)Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks., , and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 289-304. Springer, (2008)Simulatability and Security of Certificateless Threshold Signatures without Random Oracles., , and . CIS (2), page 308-313. IEEE Computer Society, (2008)978-0-7695-3508-1.Secure and efficient data transmission in the Internet of Things., , and . Telecommunication Systems, 62 (1): 111-122 (2016)Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding., , , , and . IEEE Access, (2019)An Improved Authenticated Encryption Scheme., , and . IEICE Transactions, 94-D (11): 2171-2172 (2011)