1. Identity-based encryption from the Weil pairing;Advances in Cryptology-CRYPTO,2001
2. Energy efficient hierarchical resource management for mobile cloud computing;Ahmad;IEEE Transactions on Sustainable Computing,2017
3. An authentication flaw in browser-based single sign-on protocols: Impact and remediations;Armando;Comput. Security,2013
4. CEKD: Computationally efficient key distribution scheme for vehicular ad-hoc networks;Azees;Australian Journal of Basic and Applied Sciences,2016
5. EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks;Azees;IEEE Transactions on Intelligent Transportation Systems,2017