IMG

ACM-SH: An Efficient Access Control and Key Establishment Mechanism for Sustainable Smart Healthcare
Sustainability, Sus, 2022
Core Rank : - Google Rank :223
A Provably Secure Mobile User Authentication Scheme for Big Data Collection in IoT-Enabled Maritime Intelligent Transportation System
IEEE Transactions on Intelligent Transportation Systems, ITS, 2022
Core Rank : - Google Rank :143
A new robust and fragile scheme based on chaotic maps and dwt for medical image security
Multimedia Tools and Applications, MT&A, 2022
Core Rank : - Google Rank :105
A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges
Security and Privacy, S&P, 2022
Core Rank : - Google Rank :26
Third-party cyclic code reconstruction over binary erasure channel
International Journal of Information and Coding Theory, IJICOT, 2022
Core Rank : - Google Rank :-
Assessment of River Water Quality Using Qual2k Model and Water Quality Index for the Bhadra River, India
International Conference on Hydraulics, Water Resources and Coastal Engineering, HYDRO, 2022
Core Rank : - Google Rank :-
A Tutorial Reconstruction of miniKanren with Constraints
The miniKanren and Relational Programming Workshop, MRPW, 2022
Core Rank : - Google Rank :-
Investigation of microstates extracted from EEG signals of tip-pinch and wrist flexion/extension movement
SOCIETY OF APPLIED NEUROSCIENCE, SAN, 2022
Core Rank : - Google Rank :-
Homeostasis and injectivity: a reaction network perspective
Journal of Mathematical Biology, JOMB, 2022
Core Rank : - Google Rank :34
Autocatalytic recombination systems: A reaction network perspective
Mathematical Biosciences, MBio, 2022
Core Rank : - Google Rank :32