111 results on '"Farash, Mohammad"'
Search Results
2. An improved and robust biometrics-based three factor authentication scheme for multiserver environments
3. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
4. An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture
5. A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks
6. An improved and provably secure privacy preserving authentication protocol for SIP
7. An improved smart card based authentication scheme for session initiation protocol
8. A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments
9. An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client–Client Networks
10. An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre
11. A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
12. Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
13. Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
14. PFLUA-DIoT: A Pairing Free Lightweight and Unlinkable User Access Control Scheme for Distributed IoT Environments
15. Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
16. An efficient client–client password-based authentication scheme with provable security
17. An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
18. A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks
19. Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
20. An Improved WBSN Key-Agreement Protocol Based on Static Parameters and Hash Functions
21. An improved anonymous authentication scheme for distributed mobile cloud computing services
22. An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments
23. Security Vulnerabilities and Improvements of SPAM: a Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks
24. An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems
25. An improved and robust biometrics-based three factor authentication scheme for multiserver environments
26. An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks
27. A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks
28. An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client–Client Networks
29. Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card
30. An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture.
31. A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography
32. An improved smart card based authentication scheme for session initiation protocol
33. An improved and provably secure privacy preserving authentication protocol for SIP
34. A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
35. An enhanced privacy preserving remote user authentication scheme with provable security
36. A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
37. A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks
38. Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography
39. Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
40. Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’
41. An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems.
42. Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps.
43. An improved password-based authentication scheme for session initiation protocol using smart cards without verification table.
44. A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography.
45. Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
46. Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
47. An improved password-based authentication scheme for session initiation protocol using smart cards without verification table
48. An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards
49. A provably secure and efficient authentication scheme for access control in mobile pay-TV systems
50. An Enhanced Authenticated Key Agreement for Session Initiation Protocol
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.