IMG

Security in IoMT-Driven Smart Healthcare: A Comprehensive Review and Open Challenges
Neha Garg, Mohammad Wazid, Jaskaran Singh, D. P. Singh, Ashok Kumar Das
Security and Privacy, S&P, 2022
Core Rank : - Google Rank :26
Security and Privacy Issues in 5G/6G-Assisted Software-Defined Networks
Durbadal Chattaraj, Ashok Kumar Das
Software Defined Networks: Architecture and Applications, SDNAA, 2022
Core Rank : - Google Rank :-
Securing Age-of-Information (AoI)-Enabled 5G Smart Warehouse Using Access Control Scheme
Ashok Kumar Das, Sandip Roy, Eranga Bandara, Sachin Shetty
IEEE Internet of Things Journal, IOT, 2022
Core Rank : - Google Rank :186
Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for IoT applications
Dharminder Dharminder, Uddeshaya Kumar, Ashok Kumar Das, Basudeb Bera, Debasis Giri, Sajjad Shaukat Jamal, Joel J. P. C. Rodrigues
Transactions on Emerging Telecommunications Technologies, ETT, 2022
Core Rank : - Google Rank :43
Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system
Palak Bagga, Ankush Mitra, Ashok Kumar Das, Pandi Vijayakumar, Youngho Park, Marimuthu Karuppiah
Computer Communications, CC, 2022
Core Rank : - Google Rank :91
Robust Certificateless Authentication Protocol for the SAE J1939 Commercial Vehicles Bus
Basker Palaniswamy, Keyvan Ansari, Alavalapati Goutham Reddy, Ashok Kumar Das, Sachin Shetty
IEEE Transactions on Vehicular Technology, TVT, 2022
Core Rank : - Google Rank :141
Post-Quantum Secure Identity-Based Encryption Scheme Using Random Integer Lattices for IoT-Enabled AI Applications
Dharminder Dharminder, Ashok Kumar Das, Sourav Saha, Basudeb Bera, Athanasios V. Vasilakos
Security and Communication Networks, SCNW, 2022
Core Rank : - Google Rank :56
On the design of an AI-driven secure communication scheme for internet of medical things environment
Neha Garg, Rajat Petwal, Mohammad Wazid, Ashok Kumar Das, Joel J.p.c. Rodrigues
Digital Communications and Networks, DCN, 2022
Core Rank : - Google Rank :51
Machine learning security attacks and defense approaches for emerging cyber physical applications: A comprehensive survey
Jaskaran Singh, Mohammad Wazid, Ashok Kumar Das, Vinay Chamola, Mohsen Guizani
Computer Communications, CC, 2022
Core Rank : - Google Rank :91
KL-RAP: An Efficient Key-Less RFID Authentication Protocol Based on ECDLP for Consumer Warehouse Management System
Bimal Kumar Meher, Ruhul Amin, Ashok Kumar Das, Muhammad Khurram Khan
IEEE Transactions on Network Science and Engineering ( Early Access ), TNSE, 2022