Found: 149
Select item for more details and to access through your institution.
Multimodal data modeling for efficiency assessment of social priority based urban bus route transportation system using GIS and data envelopment analysis.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 17, p. 23897, doi. 10.1007/s11042-018-6147-6
- By:
- Publication type:
- Article
A secure mutual authenticated key agreement of user with multiple servers for critical systems.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 9, p. 11067, doi. 10.1007/s11042-017-5078-y
- By:
- Publication type:
- Article
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 2, p. 2359, doi. 10.1007/s11042-017-4390-x
- By:
- Publication type:
- Article
An improved and secure chaotic map based authenticated key agreement in multi-server architecture.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 1, p. 1167, doi. 10.1007/s11042-016-4236-y
- By:
- Publication type:
- Article
A password based authentication scheme for wireless multimedia systems.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 24, p. 25893, doi. 10.1007/s11042-017-4701-2
- By:
- Publication type:
- Article
A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 15, p. 16463, doi. 10.1007/s11042-016-3921-1
- By:
- Publication type:
- Article
Design flaws of 'an anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography'.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 11, p. 13581, doi. 10.1007/s11042-016-3771-x
- By:
- Publication type:
- Article
Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 24, p. 17215, doi. 10.1007/s11042-015-2988-4
- By:
- Publication type:
- Article
Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 8, p. 4485, doi. 10.1007/s11042-015-2487-7
- By:
- Publication type:
- Article
A more secure digital rights management authentication scheme based on smart card.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 2, p. 1135, doi. 10.1007/s11042-014-2361-z
- By:
- Publication type:
- Article
Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 2, p. 1668, doi. 10.1007/s11227-023-05535-2
- By:
- Publication type:
- Article
A provably secure lightweight authentication protocol in mobile edge computing environments.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 12, p. 13893, doi. 10.1007/s11227-022-04411-9
- By:
- Publication type:
- Article
Intelligent monitor for typhoon in IoT system of smart city.
- Published in:
- Journal of Supercomputing, 2021, v. 77, n. 3, p. 3024, doi. 10.1007/s11227-020-03381-0
- By:
- Publication type:
- Article
Secure CLS and CL-AS schemes designed for VANETs.
- Published in:
- Journal of Supercomputing, 2019, v. 75, n. 6, p. 3076, doi. 10.1007/s11227-018-2312-y
- By:
- Publication type:
- Article
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 12, p. 6428, doi. 10.1007/s11227-017-2048-0
- By:
- Publication type:
- Article
Attribute-based authentication on the cloud for thin clients.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 11, p. 5813, doi. 10.1007/s11227-016-1948-8
- By:
- Publication type:
- Article
An efficient and secure design of multi-server authenticated key agreement protocol.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 9, p. 4771, doi. 10.1007/s11227-018-2467-6
- By:
- Publication type:
- Article
Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks.
- Published in:
- Drones (2504-446X), 2022, v. 6, n. 1, p. 10, doi. 10.3390/drones6010010
- By:
- Publication type:
- Article
An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity.
- Published in:
- BioMed Research International, 2013, v. 2013, p. 1, doi. 10.1155/2013/491289
- By:
- Publication type:
- Article
SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 7, p. N.PAG, doi. 10.3390/sym14071393
- By:
- Publication type:
- Article
Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2023, v. 2023, n. 1, p. 1, doi. 10.1186/s13638-023-02245-4
- By:
- Publication type:
- Article
RAKS: robust authentication and key agreement scheme for satellite infrastructure.
- Published in:
- Telecommunication Systems, 2022, v. 81, n. 1, p. 83, doi. 10.1007/s11235-022-00923-0
- By:
- Publication type:
- Article
Reconciliation based key exchange schemes using lattices: a review.
- Published in:
- Telecommunication Systems, 2021, v. 77, n. 2, p. 413, doi. 10.1007/s11235-021-00759-0
- By:
- Publication type:
- Article
Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors.
- Published in:
- Telecommunication Systems, 2018, v. 67, n. 2, p. 323, doi. 10.1007/s11235-017-0340-1
- By:
- Publication type:
- Article
A User Anonymous Mutual Authentication Protocol.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 9, p. 4508, doi. 10.3837/tiis.2016.09.026
- By:
- Publication type:
- Article
Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 5, p. 967, doi. 10.3837/tiis.2013.05.002
- By:
- Publication type:
- Article
An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System.
- Published in:
- Journal of Medical Systems, 2021, v. 45, n. 1, p. 1, doi. 10.1007/s10916-020-01658-8
- By:
- Publication type:
- Article
Design of a Secure Three-Factor Authentication Scheme for Smart Healthcare.
- Published in:
- Journal of Medical Systems, 2019, v. 43, n. 5, p. N.PAG, doi. 10.1007/s10916-019-1251-3
- By:
- Publication type:
- Article
Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.
- Published in:
- Journal of Medical Systems, 2016, v. 40, n. 12, p. 1, doi. 10.1007/s10916-016-0629-8
- By:
- Publication type:
- Article
Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems.
- Published in:
- Journal of Medical Systems, 2014, v. 38, n. 6, p. 1, doi. 10.1007/s10916-014-0024-2
- By:
- Publication type:
- Article
Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce.
- Published in:
- Journal of Medical Systems, 2014, v. 38, n. 5, p. 1, doi. 10.1007/s10916-014-0041-1
- By:
- Publication type:
- Article
An Authentication Scheme for Secure Access to Healthcare Services.
- Published in:
- Journal of Medical Systems, 2013, v. 37, n. 4, p. 1, doi. 10.1007/s10916-013-9954-3
- By:
- Publication type:
- Article
Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'.
- Published in:
- Journal of Medical Systems, 2013, v. 37, n. 4, p. 1, doi. 10.1007/s10916-013-9952-5
- By:
- Publication type:
- Article
Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 23, p. 9174, doi. 10.3390/s22239174
- By:
- Publication type:
- Article
An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 22, p. 8793, doi. 10.3390/s22228793
- By:
- Publication type:
- Article
LAP-IoHT: A Lightweight Authentication Protocol for the Internet of Health Things.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 14, p. N.PAG, doi. 10.3390/s22145401
- By:
- Publication type:
- Article
Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 10, p. 3858, doi. 10.3390/s22103858
- By:
- Publication type:
- Article
Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 21, p. 4625, doi. 10.3390/s19214625
- By:
- Publication type:
- Article
An approach for solving fully fuzzy multi-objective linear fractional optimization problems.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2020, v. 24, n. 12, p. 9105, doi. 10.1007/s00500-019-04442-0
- By:
- Publication type:
- Article
Optimality criteria for fuzzy-valued fractional multi-objective optimization problem.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2019, v. 23, n. 19, p. 9049, doi. 10.1007/s00500-018-3508-z
- By:
- Publication type:
- Article
Duality-based branch-bound computational algorithm for sum-of-linear-fractional multi-objective optimization problem.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2019, v. 23, n. 1, p. 197, doi. 10.1007/s00500-018-3547-5
- By:
- Publication type:
- Article
An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol.
- Published in:
- Information Technology & Control, 2019, v. 48, n. 2, p. 211, doi. 10.5755/j01.itc.48.2.17417
- By:
- Publication type:
- Article
An Authentication Framework for Roaming Service in Global Mobility Networks.
- Published in:
- Information Technology & Control, 2019, v. 48, n. 1, p. 129, doi. 10.5755/j01.itc.48.1.17270
- By:
- Publication type:
- Article
Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks.
- Published in:
- Information Technology & Control, 2018, v. 47, n. 2, p. 275, doi. 10.5755/j01.itc.47.2.16397
- By:
- Publication type:
- Article
Efficient plaintext checkable identity‐based signcryption in cyber‐physical systems towards IIoT.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2024, v. 35, n. 6, p. 1, doi. 10.1002/ett.4990
- By:
- Publication type:
- Article
A module lattice based construction of post quantum secure blockchain architecture.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2024, v. 35, n. 4, p. 1, doi. 10.1002/ett.4855
- By:
- Publication type:
- Article
A survey on the blockchain techniques for the Internet of Vehicles security.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2024, v. 35, n. 4, p. 1, doi. 10.1002/ett.4317
- By:
- Publication type:
- Article
Safety and security of autonomous vehicles.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2023, v. 34, n. 11, p. 1, doi. 10.1002/ett.4880
- By:
- Publication type:
- Article
A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2023, v. 34, n. 1, p. 1, doi. 10.1002/ett.4660
- By:
- Publication type:
- Article