Author of the publication

Special issue on security and privacy of blockchain technologies.

, , , , and . Int. J. Inf. Sec., 19 (3): 243-244 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient certificateless signature scheme without bilinear pairings., , and . Multimedia Tools Appl., 74 (16): 6519-6530 (2015)Transparent authentication scheme with adaptive biometrie features for IoT networks., , , , and . GCCE, page 1-2. IEEE, (2016)Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing., , , , and . Future Gener. Comput. Syst., (2019)A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things., , , and . Sensors, 17 (5): 1001 (2017)Security and Privacy Techniques in IoT Environment., and . Sensors, 21 (1): 1 (2021)A Trusted Reputation Management Scheme for Cross-Chain Transactions., , , , , and . Sensors, 23 (13): 6033 (July 2023)Novel RFID Authentication Schemes for Security Enhancement and System Efficiency., and . Secure Data Management, volume 4721 of Lecture Notes in Computer Science, page 203-212. Springer, (2007)You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks., , , and . IEEE Trans. Emerg. Top. Comput., 8 (2): 303-312 (2020)Authentication with What You See and Remember in the Internet of Things., , , , and . Symmetry, 10 (11): 537 (2018)Towards Intelligent Attack Detection Using DNA Computing., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (3s): 126:1-126:27 (2023)