Found: 42
Select item for more details and to access through your institution.
A Privacy Preserving Authentication Scheme for Roaming in IoT-Based Wireless Mobile Networks.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 2, p. 287, doi. 10.3390/sym12020287
- By:
- Publication type:
- Article
Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 1, p. 523, doi. 10.3837/tiis.2018.01.025
- By:
- Publication type:
- Article
An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 12, p. 5572, doi. 10.3837/tiis.2016.12.023
- By:
- Publication type:
- Article
An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 12, p. 5529, doi. 10.3837/tiis.2016.12.021
- By:
- Publication type:
- Article
SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/8669941
- By:
- Publication type:
- Article
A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/3437373
- By:
- Publication type:
- Article
Crime Prediction Model using Three Classification Techniques: Random Forest, Logistic Regression, and LightGBM.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 1, p. 240, doi. 10.14569/ijacsa.2024.0150123
- By:
- Publication type:
- Article
Anomalous event detection and localization in dense crowd scenes.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 10, p. 15673, doi. 10.1007/s11042-022-13967-w
- By:
- Publication type:
- Article
Hybrid Classifiers for Spatio-Temporal Abnormal Behavior Detection, Tracking, and Recognition in Massive Hajj Crowds.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 5, p. 1165, doi. 10.3390/electronics12051165
- By:
- Publication type:
- Article
An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices.
- Published in:
- Electronics (2079-9292), 2020, v. 9, n. 3, p. 520, doi. 10.3390/electronics9030520
- By:
- Publication type:
- Article
Distributed access control for information-centric networking architectures using verifiable credentials.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 2, p. 467, doi. 10.1007/s10207-022-00649-9
- By:
- Publication type:
- Article
A secure and efficient remote patient‐monitoring authentication protocol for cloud‐IoT.
- Published in:
- International Journal of Communication Systems, 2020, v. 33, n. 11, p. 1, doi. 10.1002/dac.4423
- By:
- Publication type:
- Article
An ameliorated two‐factor anonymous key exchange authentication protocol for mobile client‐server environment.
- Published in:
- International Journal of Communication Systems, 2018, v. 31, n. 18, p. N.PAG, doi. 10.1002/dac.3814
- By:
- Publication type:
- Article
Exploring and optimizing partitioning of large designs for multi-FPGA based prototyping platforms.
- Published in:
- Computing, 2020, v. 102, n. 11, p. 2361, doi. 10.1007/s00607-020-00834-5
- By:
- Publication type:
- Article
Rendezvous-based access control for information-centric architectures.
- Published in:
- International Journal of Network Management, 2018, v. 28, n. 1, p. 1, doi. 10.1002/nem.2007
- By:
- Publication type:
- Article
Unmanned Ariel Vehicle (UAV) Path Planning for Area Segmentation in Intelligent Landmine Detection Systems.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 16, p. 7264, doi. 10.3390/s23167264
- By:
- Publication type:
- Article
An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 22, p. 8793, doi. 10.3390/s22228793
- By:
- Publication type:
- Article
A Deep Learning Approach for Landmines Detection Based on Airborne Magnetometry Imaging and Edge Computing Ahmed Barnawi1,*, Krishan Kumar2, Neeraj Kum.
- Published in:
- CMES-Computer Modeling in Engineering & Sciences, 2024, v. 139, n. 2, p. 2117, doi. 10.32604/cmes.2023.044184
- By:
- Publication type:
- Article
A Smart Framework for Managing Natural Disasters Based on the IoT and ML.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 6, p. 3888, doi. 10.3390/app13063888
- By:
- Publication type:
- Article
Deep Learning Applications for Dyslexia Prediction.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 5, p. 2804, doi. 10.3390/app13052804
- By:
- Publication type:
- Article
DeepDCA: Novel Network-Based Detection of IoT Attacks Using Artificial Immune System.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 6, p. 1909, doi. 10.3390/app10061909
- By:
- Publication type:
- Article
The Introduction and Validation of Arabic Sino-Nasal Outcome Test (A-Snot-22).
- Published in:
- Egyptian Journal of Hospital Medicine, 2017, v. 68, n. 1, p. 824, doi. 10.12816/0038180
- By:
- Publication type:
- Article
An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics.
- Published in:
- Wireless Personal Communications, 2023, v. 129, n. 1, p. 399, doi. 10.1007/s11277-022-10103-7
- By:
- Publication type:
- Article
A Provably Secure and Lightweight Patient-Healthcare Authentication Protocol in Wireless Body Area Networks.
- Published in:
- Wireless Personal Communications, 2021, v. 117, n. 1, p. 47, doi. 10.1007/s11277-020-07237-x
- By:
- Publication type:
- Article
An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 3185, doi. 10.1007/s11277-017-3990-0
- By:
- Publication type:
- Article
The Relationship Between Electronic Cigarette Smoking And Asthma And The Role Of Mental Health In This Relationship-A Systematic Literature Review.
- Published in:
- Journal of Positive School Psychology, 2022, v. 6, n. 12, p. 73
- By:
- Publication type:
- Article
On seamless and high‐bandwidth connectivity for cognitive multi‐unmanned aerial vehicle‐assisted networks.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2021, v. 32, n. 7, p. 1, doi. 10.1002/ett.3979
- By:
- Publication type:
- Article
A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System.
- Published in:
- Computers, Materials & Continua, 2022, v. 70, n. 3, p. 6141, doi. 10.32604/cmc.2022.020774
- By:
- Publication type:
- Article
A comprehensive review on landmine detection using deep learning techniques in 5G environment: open issues and challenges.
- Published in:
- Neural Computing & Applications, 2022, v. 34, n. 24, p. 21657, doi. 10.1007/s00521-022-07819-9
- By:
- Publication type:
- Article
Self-protected content for information-centric networking architectures using verifiable credentials.
- Published in:
- Telecommunication Systems, 2022, v. 79, n. 3, p. 387, doi. 10.1007/s11235-021-00874-y
- By:
- Publication type:
- Article
Privacy preserving support vector machine based on federated learning for distributed IoT‐enabled data analysis.
- Published in:
- Computational Intelligence, 2024, v. 40, n. 2, p. 1, doi. 10.1111/coin.12636
- By:
- Publication type:
- Article
Network Learning-Enabled Sensor Association for Massive Internet of Things.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 47, n. 1, p. 843, doi. 10.32604/csse.2023.037652
- By:
- Publication type:
- Article
An Identity-Based Encryption Method for SDN-Enabled Source Routing Systems.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/1942097
- By:
- Publication type:
- Article
TC-PSLAP: Temporal Credential-Based Provably Secure and Lightweight Authentication Protocol for IoT-Enabled Drone Environments.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/9919460
- By:
- Publication type:
- Article
A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/3437373
- By:
- Publication type:
- Article
Securing SDN-Based IoT Group Communication.
- Published in:
- Future Internet, 2021, v. 13, n. 8, p. 207, doi. 10.3390/fi13080207
- By:
- Publication type:
- Article
An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2020, v. 16, n. 6, p. 1, doi. 10.1177/1550147720925772
- By:
- Publication type:
- Article
CMAP-IoT: Chaotic Map-Based Authentication Protocol for Crowdsourcing Internet of Things.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2024, v. 49, n. 3, p. 3453, doi. 10.1007/s13369-023-08047-6
- By:
- Publication type:
- Article
Secure and Efficient Cloud-based IoT Authenticated Key Agreement scheme for e-Health Wireless Sensor Networks.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2021, v. 46, n. 4, p. 3017, doi. 10.1007/s13369-020-04905-9
- By:
- Publication type:
- Article
Information Flow Tracking and Auditing for the Internet of Things Using Software-Defined Networking.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2020, v. 45, n. 4, p. 3123, doi. 10.1007/s13369-019-04297-5
- By:
- Publication type:
- Article
A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.’s Scheme.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2018, v. 43, n. 12, p. 8239, doi. 10.1007/s13369-018-3494-6
- By:
- Publication type:
- Article
A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.
- Published in:
- PLoS ONE, 2017, v. 12, n. 10, p. 1, doi. 10.1371/journal.pone.0186044
- By:
- Publication type:
- Article