IMG

A Formal Model of Web Security Showing Malicious Cross Origin Requests and Its Mitigation using CORP.
International Conference on Information Systems Security and Privacy, ICISSP, 2017
Core Rank : C Google Rank :22
Mitigating browser-based DDoS attacks using CORP
Innovations in Software Engineering Conference, ISEC, 2017
Core Rank : - Google Rank :11
Notion of Semantics in Computer Science-A Systematic Literature Review
International Conference on Natural Language Processing., ICON, 2017
Core Rank : - Google Rank :5
Modelling and Mitigation of Cross-Origin Request Attacks on Federated Identity Management Using Cross Origin Request Policy
International Conference on Information Systems Security, ICISS, 2017
Core Rank : - Google Rank :-
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
IEEE Access, ACCESS, 2017
Core Rank : - Google Rank :266
Lightweight authentication protocols for wearable devices
Computers & Electrical Engineering, CEEng, 2017
Google Rank :94
Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks
IEEE Access, ACCESS, 2017
Core Rank : - Google Rank :266
Design of Secure User Authenticated Key Management Protocol for Generic IoT Network
IEEE Internet of Things Journal, IOT, 2017
Core Rank : - Google Rank :186
On the Design of Secure User Authenticated Key Management Scheme for Multi-Gateway Based Wireless Sensor Networks using ECC
International Journal of Communication Systems, IJCS, 2017
Core Rank : - Google Rank :52
Design of mutually authenticated key agreement protocol resistant to impersonation attacks for multi-server environment
IEEE Access, ACCESS, 2017
Core Rank : - Google Rank :266