28 results on '"Shetty, Sachin"'
Search Results
2. Post Quantum Lattice-Based Secure Framework using Aggregate Signature for Ambient Intelligence Assisted Blockchain-Based IoT Applications
3. BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare
4. Securing Age-of-Information (AoI)-Enabled 5G Smart Warehouse Using Access Control Scheme
5. An Efficient Lightweight Provably Secure Authentication Protocol for Patient Monitoring Using Wireless Medical Sensor Networks
6. APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
7. An Authentication and Key Management Framework for Secure and Intelligent Transportation of Internet of Space Things
8. Neuro-Symbolic Explainable Artificial Intelligence Twin for Zero-Touch IoE in Wireless Network
9. Blockchain-Based Efficient Access Control with Handover Policy in IoV-Enabled Intelligent Transportation System
10. Design of Robust Blockchain-Envisioned Authenticated Key Management Mechanism for Smart Healthcare Applications
11. AISCM-FH: AI-Enabled Secure Communication Mechanism in Fog Computing-Based Healthcare
12. TACAS-IoT: Trust Aggregation Certificate-Based Authentication Scheme for Edge-Enabled IoT Systems
13. Guest Editorial Special Issue on Secure Data Analytics for Emerging Internet of Things
14. ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things
15. Robust Certificateless Authentication Protocol for the SAE J1939 Commercial Vehicles Bus
16. Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems
17. Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap
18. Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement
19. Exploring the Attack Surface of Blockchain: A Comprehensive Survey
20. Measuring Decentrality in Blockchain Based Systems
21. A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things
22. AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment
23. Data Provenance in the Cloud: A Blockchain-Based Approach
24. IoMT Malware Detection Approaches: Analysis and Research Challenges
25. Secrecy Rates and Optimal Power Allocation for Full-Duplex Decode-and-Forward Relay Wire-Tap Channels
26. Stackelberg-Game-Based Dynamic Spectrum Access in Heterogeneous Wireless Systems
27. On Secrecy Rate and Optimal Power Allocation of the Full-Duplex Amplify-and-Forward Relay Wire-Tap Channel
28. Physical layer security in wireless cooperative relay networks: state of the art and beyond
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.