Search

Your search keyword '"Muhammad Khurram"' showing total 241 results

Search Constraints

Start Over You searched for: Author "Muhammad Khurram" Remove constraint Author: "Muhammad Khurram" Topic computer security Remove constraint Topic: computer security
241 results on '"Muhammad Khurram"'

Search Results

1. Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.

2. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

3. A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.

4. A New Random Walk for Replica Detection in WSNs.

5. SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications.

6. An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.

7. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.

8. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

9. Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.

10. Security Analysis and Improvement of 'a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System'.

11. Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems.

12. Cryptanalysis and improvement of Yan et al.'s biometric-based authentication scheme for telecare medicine information systems.

13. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

14. Smart environment as a service: three factor cloud based user authentication for telecare medical information system.

16. An authentication scheme for secure access to healthcare services.

17. Cryptanalysis and improvement of 'A privacy enhanced scheme for telecare medical information systems'.

18. An improved biometrics-based remote user authentication scheme with user anonymity.

19. Secure chaotic map based block cryptosystem with application to camera sensor networks.

20. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'.

21. Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theorem.

22. Cybersecurity Digital Labels for Connected and Autonomous Vehicles

23. An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System

24. On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing

25. Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones

26. Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems

27. Augmenting Cybersecurity in Autonomous Vehicles: Innovative Recommendations for Aspiring Entrepreneurs

28. Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios

29. A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things

30. Comments on 'Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC'

31. Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies

33. A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems

34. PoRX: A reputation incentive scheme for blockchain consensus of IIoT

35. Comprehensive Review of Cybercrime Detection Techniques

36. DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain

37. Hand-based multibiometric systems: state-of-the-art and future challenges

38. Comment on 'Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication'

39. A survey on the blockchain techniques for the Internet of Vehicles security

40. Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment

41. Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance

42. g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices

43. An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment

44. Towards augmented proactive cyberthreat intelligence

45. A survey on privacy protection in blockchain system

46. Questioning Key Compromise Attack on Ostad-Sharif et al.’s Authentication and Session key Generation Scheme for Healthcare Applications

47. An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network

48. Digital Labels: Influencing Consumers Trust and Raising Cybersecurity Awareness for Adopting Autonomous Vehicles

49. Designing secure and lightweight user access to drone for smart city surveillance

50. Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment

Catalog

Books, media, physical & digital resources