IMG

Taxonomy and Analysis of Security Protocols for Internet of Things
Future Generation Computer Systems, FGCS, 2018
Core Rank : - Google Rank :146
Provably Secure Multi-Server Authentication Protocol using Fuzzy Commitment
IEEE Access, ACCESS, 2018
Core Rank : - Google Rank :266
Quantum no-go theorems in causality respecting systems in the presence of closed timelike curves: Tweaking the Deutsch condition
Europhysics Letters, EPL, 2018
Core Rank : - Google Rank :41
Authentication Protocols for the Internet of Drones: Taxonomy, Analysis and Future Directions
Journal on Ambient Intelligence and Humanized Computing, JAIHC, 2018
Core Rank : - Google Rank :-
Secure Healthcare Data Dissemination Using Vehicle Relay Networks
IEEE Internet of Things Journal, IOT, 2018
Core Rank : - Google Rank :186
Authenticated key management protocol for cloud-assisted body area sensor networks
Journal on Network and Computer Applications, JNCA, 2018
Core Rank : A
Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment
IEEE Internet of Things Journal, IOT, 2018
Core Rank : - Google Rank :186
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks.
IACR Cryptology ePrint Archive, CEA, 2018
Core Rank : - Google Rank :-
HEAP: An Efficient and Fault-tolerant Authentication and Key Exchange Protocol for Hadoop-assisted Big Data Platform
IEEE Access, ACCESS, 2018
Core Rank : - Google Rank :266
Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
IEEE Internet of Things Journal, IOT, 2018
Core Rank : - Google Rank :186