Fahad Bin Muhaya
According to our database1,
Fahad Bin Muhaya
authored at least 28 papers
between 2009 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2015
Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps.
Wirel. Pers. Commun., 2015
An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2015
Cryptanalysis and security enhancement of Zhu's authentication scheme for Telecare medicine information system.
Secur. Commun. Networks, 2015
Security analysis and improvement of a mutual authentication scheme under trusted computing.
Int. J. Ad Hoc Ubiquitous Comput., 2015
IEEE Commun. Surv. Tutorials, 2015
2014
Proceedings of the 21st International Conference on Telecommunications, 2014
2013
Multim. Tools Appl., 2013
Int. J. Distributed Sens. Networks, 2013
Int. J. Data Min. Model. Manag., 2013
Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme".
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Predicted probability enhancement for multi-label text classification using class label pair association.
Proceedings of the 2013 IEEE Conference on Evolving and Adaptive Intelligent Systems, 2013
Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2013
2012
2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
2010
Int. J. Comput. Commun. Control, 2010
Realization of Call-Back Authentication (CBA) for secure web to cellular phone SMS communication.
Comput. Math. Appl., 2010
Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010
Proceedings of the Information Security and Assurance - 4th International Conference, 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
2009
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009