202 results on '"Muhammad Khurram"'
Search Results
2. Concomitant Skew and Phase Correction (CSPC) for Industry 5.0 Enabler Pervasive Distributed Computing Systems
3. A Privacy-Preserving Authentication Protocol for Electric Vehicle Battery Swapping Based On Intelligent Blockchain
4. Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment
5. Assessment by Lean Modified Manufacturing Maturity Model for Industry 4.0: A Case Study of Pakistan's Manufacturing Sector
6. A Secure and Efficient Biometric Template Protection Scheme for Palmprint Recognition System
7. A Secure Certificateless Signcryption Scheme Without Pairing for Internet of Medical Things
8. An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks
9. An AI-Enabled Hybrid Lightweight Authentication Scheme for Intelligent IoMT Based Cyber-Physical Systems
10. Cracking the Anonymous IoT Routing Networks: A Deep Learning Approach
11. PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things
12. An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs
13. B-HAS: Blockchain-Assisted Efficient Handover Authentication and Secure Communication Protocol in VANETs
14. Cybersecurity Digital Labels for Connected and Autonomous Vehicles
15. Signgraph: An Efficient and Accurate Pose-Based Graph Convolution Approach Toward Sign Language Recognition
16. Assessment by Lean Modified Manufacturing Maturity Model for Industry 4.0: A Case Study of Pakistan's Manufacturing Sector
17. Guest Editorial: Cybersecurity Intelligence in the Healthcare System
18. Co-Learning to Hash Palm Biometrics for Flexible IoT Deployment
19. Privacy-Enabling Framework for Cloud-Assisted Digital Healthcare Industry
20. An Improved Lightweight PUF–PKI Digital Certificate Authentication Scheme for the Internet of Things
21. DeFLoc: Deep Learning Assisted Indoor Vehicle Localization Atop FM Fingerprint Map
22. A Secure Certificateless Signcryption Scheme Without Pairing for Internet of Medical Things
23. KL-RAP: An Efficient Key-Less RFID Authentication Protocol Based on ECDLP for Consumer Warehouse Management System
24. A Blockchain-Based Self-Tallying Voting Protocol With Maximum Voter Privacy
25. Integrating Stochastic Geometry and ON/OFF Traffic Models: Toward Spatio-Temporal Analysis of Wireless Networks With Heterogeneous Services
26. An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System
27. Data plane failure and its recovery techniques in SDN: A systematic literature review
28. Cracking the Anonymous IoT Routing Networks: A Deep Learning Approach
29. PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things
30. Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System
31. A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment
32. Cybersecurity Digital Labels for Connected and Autonomous Vehicles
33. B-HAS: Blockchain-Assisted Efficient Handover Authentication and Secure Communication Protocol in VANETs
34. Guest Editorial: Cybersecurity Intelligence in the Healthcare System
35. D3APTS: Design of ECC Based Authentication Protocol and Data Storage for Tactile Internet enabled IoD System With Blockchain
36. An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs
37. GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network
38. Signgraph: An Efficient and Accurate Pose-Based Graph Convolution Approach Toward Sign Language Recognition
39. Stalker Attacks: Imperceptibly Dropping Sketch Measurement Accuracy on Programmable Switches
40. Security Enhanced Authentication Protocol for Space-Ground Integrated Railway Networks
41. Empowering Network Security With Programmable Switches: A Comprehensive Survey
42. Data plane failure and its recovery techniques in SDN: A systematic literature review
43. Improving the Software-Defined Wireless Sensor Networks Routing Performance Using Reinforcement Learning
44. Improving the Security of LTE-R for High-Speed Railway: From the Access Authentication View
45. A Systematic Literature Review on Machine Learning and Deep Learning Methods for Semantic Segmentation
46. ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things
47. Lean Implementation Framework: A Case of Performance Improvement of Casting Process
48. An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT
49. MHADBOR: AI-Enabled Administrative-Distance-Based Opportunistic Load Balancing Scheme for an Agriculture Internet of Things Network
50. A Secure and Efficient Biometric Template Protection Scheme for Palmprint Recognition System
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.