IMG

SecSVA: secure storage, verification, and auditing of big data in the cloud environment
IEEE Communications Magzine, CM, 2018
Core Rank : - Google Rank :94
Providing healthcare-as-a-service using fuzzy rule based big data analytics in cloud computing
IEEE Journal of Biomedical and Health Informatics, JBioHI, 2018
Core Rank : - Google Rank :103
Impossibility of cloning of quantum coherence
Physical Review A, PRA, 2018
Core Rank : - Google Rank :86
A new two-server authentication and key agreement protocol for accessing secure cloud services
Computer Networks, CN, 2018
Core Rank : - Google Rank :93
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
Journal on SuperComputing, JSC, 2018
Core Rank : - Google Rank :-
LaCSys: Lattice-based cryptosystem for secure communication in smart grid environment
International Conference on Communications, ICC, 2018
Core Rank : - Google Rank :76
Design of a secure anonymity‑preserving authentication scheme for session initiation protocol using elliptic curve cryptography
Journal on Ambient Intelligence and Humanized Computing, JAIHC, 2018
Core Rank : - Google Rank :-
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
Computers & Electrical Engineering, CEEng, 2018
Google Rank :94
Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial Internet of Things
IEEE Transactions on Dependable and Secure Computing, TDSC, 2018
Core Rank : - Google Rank :70
A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications
Journal on Ambient Intelligence and Humanized Computing, JAIHC, 2018
Core Rank : - Google Rank :-