Found: 149
Select item for more details and to access through your institution.
An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks.
- Published in:
- Multimedia Systems, 2017, v. 23, n. 2, p. 195, doi. 10.1007/s00530-015-0476-3
- By:
- Publication type:
- Article
An Efficient DWT and Intuitionistic Fuzzy Based Multimodality Medical Image Fusion.
- Published in:
- International Journal of Imaging Systems & Technology, 2017, v. 27, n. 2, p. 118, doi. 10.1002/ima.22216
- By:
- Publication type:
- Article
SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 7, p. N.PAG, doi. 10.3390/sym14071393
- By:
- Publication type:
- Article
Verifier-based anonymous password-authenticated key exchange protocol in the standard model.
- Published in:
- Mathematical Biosciences & Engineering, 2019, v. 16, n. 5, p. 3623, doi. 10.3934/mbe.2019180
- By:
- Publication type:
- Article
Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 1, p. 523, doi. 10.3837/tiis.2018.01.025
- By:
- Publication type:
- Article
A User Anonymous Mutual Authentication Protocol.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 9, p. 4508, doi. 10.3837/tiis.2016.09.026
- By:
- Publication type:
- Article
Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 5, p. 967, doi. 10.3837/tiis.2013.05.002
- By:
- Publication type:
- Article
χperbp: a cloud-based lightweight mutual authentication protocol.
- Published in:
- Peer-to-Peer Networking & Applications, 2023, v. 16, n. 4, p. 1785, doi. 10.1007/s12083-023-01467-z
- By:
- Publication type:
- Article
Fog-based low latency and lightweight authentication protocol for vehicular communication.
- Published in:
- Peer-to-Peer Networking & Applications, 2023, v. 16, n. 2, p. 629, doi. 10.1007/s12083-022-01425-1
- By:
- Publication type:
- Article
An authentication and key agreement scheme for smart grid.
- Published in:
- Peer-to-Peer Networking & Applications, 2022, v. 15, n. 3, p. 1595, doi. 10.1007/s12083-022-01305-8
- By:
- Publication type:
- Article
Verifiable dynamic ranked search with forward privacy over encrypted cloud data.
- Published in:
- Peer-to-Peer Networking & Applications, 2021, v. 14, n. 5, p. 2977, doi. 10.1007/s12083-021-01132-3
- By:
- Publication type:
- Article
A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments.
- Published in:
- Peer-to-Peer Networking & Applications, 2020, v. 13, n. 6, p. 1943, doi. 10.1007/s12083-020-00929-y
- By:
- Publication type:
- Article
An improved and provably secure three-factor user authentication scheme for wireless sensor networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2018, v. 11, n. 1, p. 1, doi. 10.1007/s12083-016-0485-9
- By:
- Publication type:
- Article
A new and secure authentication scheme for wireless sensor networks with formal proof.
- Published in:
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 1, p. 16, doi. 10.1007/s12083-015-0404-5
- By:
- Publication type:
- Article
An improved smart card based authentication scheme for session initiation protocol.
- Published in:
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 1, p. 92, doi. 10.1007/s12083-015-0409-0
- By:
- Publication type:
- Article
Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 1, p. 79, doi. 10.1007/s12083-015-0408-1
- By:
- Publication type:
- Article
An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city.
- Published in:
- Personal & Ubiquitous Computing, 2017, v. 21, n. 5, p. 791, doi. 10.1007/s00779-017-1054-9
- By:
- Publication type:
- Article
Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks.
- Published in:
- Drones (2504-446X), 2022, v. 6, n. 1, p. 10, doi. 10.3390/drones6010010
- By:
- Publication type:
- Article
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6658041
- By:
- Publication type:
- Article
An Improved Blockchain-Based Authentication Protocol for IoT Network Management.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/8836214
- By:
- Publication type:
- Article
An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/347169
- By:
- Publication type:
- Article
Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2023, v. 2023, n. 1, p. 1, doi. 10.1186/s13638-023-02245-4
- By:
- Publication type:
- Article
Enhanced privacy-preserving in student certificate management in blockchain and interplanetary file system.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 8, p. 12595, doi. 10.1007/s11042-022-13915-8
- By:
- Publication type:
- Article
Predicting airline customers' recommendations using qualitative and quantitative contents of online reviews.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 5, p. 6979, doi. 10.1007/s11042-022-11972-7
- By:
- Publication type:
- Article
Multimodal data modeling for efficiency assessment of social priority based urban bus route transportation system using GIS and data envelopment analysis.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 17, p. 23897, doi. 10.1007/s11042-018-6147-6
- By:
- Publication type:
- Article
A secure mutual authenticated key agreement of user with multiple servers for critical systems.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 9, p. 11067, doi. 10.1007/s11042-017-5078-y
- By:
- Publication type:
- Article
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 2, p. 2359, doi. 10.1007/s11042-017-4390-x
- By:
- Publication type:
- Article
An improved and secure chaotic map based authenticated key agreement in multi-server architecture.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 1, p. 1167, doi. 10.1007/s11042-016-4236-y
- By:
- Publication type:
- Article
A password based authentication scheme for wireless multimedia systems.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 24, p. 25893, doi. 10.1007/s11042-017-4701-2
- By:
- Publication type:
- Article
A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 15, p. 16463, doi. 10.1007/s11042-016-3921-1
- By:
- Publication type:
- Article
Design flaws of 'an anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography'.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 11, p. 13581, doi. 10.1007/s11042-016-3771-x
- By:
- Publication type:
- Article
Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 24, p. 17215, doi. 10.1007/s11042-015-2988-4
- By:
- Publication type:
- Article
Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 8, p. 4485, doi. 10.1007/s11042-015-2487-7
- By:
- Publication type:
- Article
A more secure digital rights management authentication scheme based on smart card.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 2, p. 1135, doi. 10.1007/s11042-014-2361-z
- By:
- Publication type:
- Article
A Secure Authentication Scheme for Teleservices Using Multi-Server Architecture.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 18, p. N.PAG, doi. 10.3390/electronics11182839
- By:
- Publication type:
- Article
Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity.
- Published in:
- International Journal of Information Security, 2020, v. 19, n. 3, p. 311, doi. 10.1007/s10207-019-00459-6
- By:
- Publication type:
- Article
An efficient certificateless key exchange protocol for heterogeneous networks in human‐centered IoT systems.
- Published in:
- International Journal of Communication Systems, 2023, v. 36, n. 12, p. 1, doi. 10.1002/dac.4093
- By:
- Publication type:
- Article
Smart sensors in vehicular communication networks: Principles, algorithms, systems and applications.
- Published in:
- International Journal of Communication Systems, 2022, v. 35, n. 12, p. 1, doi. 10.1002/dac.5259
- By:
- Publication type:
- Article
Energy‐efficient fog computing in Internet of Things based on Routing Protocol for Low‐Power and Lossy Network with Contiki.
- Published in:
- International Journal of Communication Systems, 2022, v. 35, n. 4, p. 1, doi. 10.1002/dac.5049
- By:
- Publication type:
- Article
Green energy‐efficient computing solutions in Internet of Things communications.
- Published in:
- International Journal of Communication Systems, 2022, v. 35, n. 1, p. 1, doi. 10.1002/dac.5046
- By:
- Publication type:
- Article
Certain investigations on recent advances in the design of decoding algorithms using low‐density parity‐check codes and its applications.
- Published in:
- International Journal of Communication Systems, 2021, v. 34, n. 8, p. 1, doi. 10.1002/dac.4765
- By:
- Publication type:
- Article
Smart workload migration on external cloud service providers to minimize delay, running time, and transfer cost.
- Published in:
- International Journal of Communication Systems, 2021, v. 34, n. 3, p. 1, doi. 10.1002/dac.4686
- By:
- Publication type:
- Article
SEBAP: A secure and efficient biometric‐assisted authentication protocol using ECC for vehicular cloud computing.
- Published in:
- International Journal of Communication Systems, 2021, v. 34, n. 2, p. 1, doi. 10.1002/dac.4103
- By:
- Publication type:
- Article
A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things.
- Published in:
- International Journal of Communication Systems, 2020, v. 33, n. 13, p. 1, doi. 10.1002/dac.3906
- By:
- Publication type:
- Article
Revised anonymous authentication protocol for adaptive client‐server infrastructure.
- Published in:
- International Journal of Communication Systems, 2020, v. 33, n. 4, p. N.PAG, doi. 10.1002/dac.4253
- By:
- Publication type:
- Article
A provably secure biometrics and ECC‐based authentication and key agreement scheme for WSNs.
- Published in:
- International Journal of Communication Systems, 2020, v. 33, n. 3, p. N.PAG, doi. 10.1002/dac.4194
- By:
- Publication type:
- Article
An enhanced anonymous identity‐based key agreement protocol for smart grid advanced metering infrastructure.
- Published in:
- International Journal of Communication Systems, 2019, v. 32, n. 16, p. N.PAG, doi. 10.1002/dac.4137
- By:
- Publication type:
- Article
GUIDE: Smartphone sensors‐based pedestrian indoor localization with heterogeneous devices.
- Published in:
- International Journal of Communication Systems, 2019, v. 32, n. 15, p. N.PAG, doi. 10.1002/dac.4062
- By:
- Publication type:
- Article
An improved lightweight multiserver authentication scheme.
- Published in:
- International Journal of Communication Systems, 2017, v. 30, n. 17, p. n/a, doi. 10.1002/dac.3351
- By:
- Publication type:
- Article
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security.
- Published in:
- International Journal of Communication Systems, 2017, v. 30, n. 4, p. n/a, doi. 10.1002/dac.3019
- By:
- Publication type:
- Article