IMG

A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
Saru Kumari, Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Fan Wu, Neeraj Kumar
Journal on SuperComputing, JSC, 2018
Core Rank : - Google Rank :-
A new two-server authentication and key agreement protocol for accessing secure cloud services
Durbadal Chattaraj, Monalisa Sarma, Ashok Kumar Das
Computer Networks, CN, 2018
Core Rank : - Google Rank :93
Impossibility of cloning of quantum coherence
Dhrumil Patel, Subhasree Patro, V Chiranjeevi, Indranil Chakrabarty, Arun Kumar Pati
Physical Review A, PRA, 2018
Core Rank : - Google Rank :86
Providing healthcare-as-a-service using fuzzy rule based big data analytics in cloud computing
Anish Jindal, Amit Dua, Neeraj Kumar, Ashok Kumar Das, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues
IEEE Journal of Biomedical and Health Informatics, JBioHI, 2018
Core Rank : - Google Rank :103
SecSVA: secure storage, verification, and auditing of big data in the cloud environment
Gagangeet Singh Aujla, Rajat Chaudhary, Neeraj Kumar, Ashok Kumar Das, Joel J. P. C. Rodrigues
IEEE Communications Magzine, CM, 2018
Core Rank : - Google Rank :94
Authentication in cloud-driven IoT-based big data environment: Survey and outlook
Mohammad Wazid, Ashok Kumar Das, Rasheed Hussain, Giancarlo Succi, Joel J.p.c. Rodrigues
Journal of Systems Architecture, JSA, 2018
Core Rank : - Google Rank :54
Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues
IEEE Internet of Things Journal, IOT, 2018
Core Rank : - Google Rank :186
HEAP: An Efficient and Fault-tolerant Authentication and Key Exchange Protocol for Hadoop-assisted Big Data Platform
Durbadal Chattaraj, Monalisa Sarma, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues, Youngho Park
IEEE Access, ACCESS, 2018
Core Rank : - Google Rank :266
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks.
Behnam Zahednejad, Majid Bayat, Ashok Kumar Das
IACR Cryptology ePrint Archive, CEA, 2018
Core Rank : - Google Rank :-
Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment
Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues
IEEE Internet of Things Journal, IOT, 2018
Core Rank : - Google Rank :186