IMG

Notion of Semantics in Computer Science-A Systematic Literature Review
International Conference on Natural Language Processing., ICON, 2017
Core Rank : - Google Rank :5
Modelling and Mitigation of Cross-Origin Request Attacks on Federated Identity Management Using Cross Origin Request Policy
International Conference on Information Systems Security, ICISS, 2017
Core Rank : - Google Rank :-
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
IEEE Access, ACCESS, 2017
Core Rank : - Google Rank :266
Lightweight authentication protocols for wearable devices
Computers & Electrical Engineering, CEEng, 2017
Google Rank :94
Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks
IEEE Access, ACCESS, 2017
Core Rank : - Google Rank :266
Design of Secure User Authenticated Key Management Protocol for Generic IoT Network
IEEE Internet of Things Journal, IOT, 2017
Core Rank : - Google Rank :186
On the Design of Secure User Authenticated Key Management Scheme for Multi-Gateway Based Wireless Sensor Networks using ECC
International Journal of Communication Systems, IJCS, 2017
Core Rank : - Google Rank :52
Design of mutually authenticated key agreement protocol resistant to impersonation attacks for multi-server environment
IEEE Access, ACCESS, 2017
Core Rank : - Google Rank :266
Expressive CP-ABE Scheme for Mobile Devices in IoT satisfying Constant-size Keys and Ciphertexts
IEEE Access, ACCESS, 2017
Core Rank : - Google Rank :266
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
Future Generation Computer Systems, FGCS, 2017
Core Rank : - Google Rank :146