?
Cryptology and Network Security with Machine Learning; Lecture Notes in Networks and Systems ,
1
Correctness Proof of the Verification of 'A Combined Public..:
, In:
?
Lecture Notes in Electrical Engineering; Genetic and Evolutionary Computing ,
2
Fick's Law Algorithm with Gaussian Mutation: Design and Ana..:
, In:
?
Enhancing Education With Intelligent Systems and Data-Driven Instruction; Advances in Educational Technologies and Instructional Design ,
3
Agile Approaches and Practices in Higher Education Systems:
, In:
?
Cryptology and Network Security with Machine Learning; Lecture Notes in Networks and Systems ,
4
Analyzing and Enhancing a User Authentication Scheme for Ad..:
, In:
?
Advances in Smart Vehicular Technology, Transportation, Communication and Applications; Smart Innovation, Systems and Technologies ,
5
Privileged Insider Attacks on Two Authentication Schemes:
, In:
?
Advances in Smart Vehicular Technology, Transportation, Communication and Applications; Smart Innovation, Systems and Technologies ,
6
To Analyze Security Requirements of Two AKA Protocols in WB..:
, In:
?
Advances in Smart Vehicular Technology, Transportation, Communication and Applications; Smart Innovation, Systems and Technologies ,
7
Security Analysis of Two Authentication and Key Agreement P..:
, In:
?
Cryptology and Network Security with Machine Learning; Algorithms for Intelligent Systems ,
8
Flaws of a Password-Based Three-Party Authenticated Key Agr..:
, In:
?
2023 Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC) ,
9
TUDF-NeRF: Generalizable Neural Radiance Field via Truncate..:
, In:
?
Advances in Smart Vehicular Technology, Transportation, Communication and Applications; Smart Innovation, Systems and Technologies ,
10
Comments on "Two Authentication and Key Agreement Protocols..:
, In:
?
2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) ,
11
Security Flaws in Dhillon and Kalra's User Authentication S..:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
12
A Traceable and Revocable Attribute-based Encryption Scheme..:
, In:
?
2020 9th International Conference System Modeling and Advancement in Research Trends (SMART) ,
13