290 results on '"Bagheri, Nasour"'
Search Results
2. Secure and Efficient Lightweight Authentication Protocol (SELAP) for multi-sector IoT applications
3. Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures
4. χperbp: a cloud-based lightweight mutual authentication protocol
5. Designing secure PUF-based authentication protocols for constrained environments
6. Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures
7. Cryptanalysis of two recently proposed ultralightweight authentication protocol for IoT
8. Deeper neural network models better reflect how humans cope with contrast variation in object recognition
9. Improving RFID/IoT-based generalized ultra-lightweight mutual authentication protocols
10. Deep learning based bio-metric authentication system using a high temporal/frequency resolution transform.
11. ECGsound for human identification
12. Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
13. RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing
14. Reliable advanced encryption standard hardware implementation: 32- bit and 64-bit data-paths
15. IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity
16. ECCbAP: A secure ECC-based authentication protocol for IoT edge devices
17. Lightweight implementation of SILC, CLOC, AES-JAMBU and COLM authenticated ciphers
18. MDSbSP: a search protocol based on MDS codes for RFID-based Internet of vehicle
19. On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments
20. Fault Attack on SKINNY Cipher
21. Toward designing a lightweight RFID authentication protocol for constrained environments.
22. Differential Fault Attack on SKINNY Block Cipher
23. Reliable S-Box Hardware Implementation by Gate-Level Fault Masking Enhancement
24. Security Analysis of Niu et al. Authentication and Ownership Management Protocol
25. Cryptanalysis of reduced QTL block cipher
26. Hard-wired feed-forward visual mechanisms of the brain compensate for affine variations in object recognition
27. Average activity, but not variability, is the dominant factor in the representation of object categories in the brain
28. The Rise of Passive RFID RTLS Solutions in Industry 5.0.
29. Cryptanalysis of Reduced NORX
30. Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ
31. An improved low-cost yoking proof protocol based on Kazahaya’s flaws
32. A secure search protocol for lightweight and low-cost RFID systems
33. Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures
34. Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures
35. Differential Fault Analysis of SHA-3
36. Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48
37. Linear Cryptanalysis of Reduced-Round SIMECK Variants
38. Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol.
39. $$\chi$$perbp: a cloud-based lightweight mutual authentication protocol
40. Using a Privacy-Enhanced Authentication Processto Secure IoT-based Smart Grid Infrastructures
41. Toward Designing a Secure Authentication Protocol for IoT Environments
42. Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things
43. A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications
44. Cryptanalysis of SIMON Variants with Connections
45. Desynchronization and Traceability Attacks on RIPTA-DA Protocol
46. On the Security of Two RFID Mutual Authentication Protocols
47. On the Security of Tan et al. Serverless RFID Authentication and Search Protocols
48. Another Fallen Hash-Based RFID Authentication Protocol
49. On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.’s Protocol
50. Improved Security Analysis of Fugue-256 (Poster)
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.