Search

Your search keyword '"Muhammad Khurram"' showing total 196 results

Search Constraints

Start Over You searched for: Author "Muhammad Khurram" Remove constraint Author: "Muhammad Khurram" Topic authentication Remove constraint Topic: authentication
196 results on '"Muhammad Khurram"'

Search Results

1. ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things

2. VASERP: An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV

3. Questioning Key Compromise Attack on Ostad-Sharif et al.’s Authentication and Session key Generation Scheme for Healthcare Applications

4. A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems

5. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’

11. Improving the Security of LTE-R for High-Speed Railway: From the Access Authentication View

12. An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT

15. Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function

16. On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing

17. Efficient Privacy-Preserving Authentication Scheme With Fine-Grained Error Location for Cloud-Based VANET

18. Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones

19. Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems

20. An efficient certificateless key exchange protocol for heterogeneous networks in human‐centered IoT systems.

21. VASERP: An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV.

25. Comments on 'Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC'

26. A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography

27. Efficient and secure e‐voting scheme using elliptic curve cryptography.

32. ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things

33. A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems

34. Comment on 'Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication'

39. Emerging IoT Applications in Sustainable Smart Cities for COVID-19: Network Security and Data Preservation Challenges with Future Directions

40. g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices

41. Questioning Key Compromise Attack on Ostad-Sharif et al.’s Authentication and Session key Generation Scheme for Healthcare Applications

42. SPSR-FSPG: A Fast Simulative Password Set Generation Algorithm

43. Trust Management Techniques for the Internet of Things: A Survey

45. Privacy-Enabling Framework for Cloud-Assisted Digital Healthcare Industry.

48. Designing secure and lightweight user access to drone for smart city surveillance

49. Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment

50. A secure chaotic map-based remote authentication scheme for telecare medicine information systems

Catalog

Books, media, physical & digital resources