42 results on '"Deebak, B. D."'
Search Results
2. Security and privacy issues in smart cities/industries: technologies, applications, and challenges
3. Seamless privacy-preservation and authentication framework for IoT-enabled smart eHealth systems
4. COVID-19 Patient Care: A Content-Based Collaborative Filtering Using Intelligent Recommendation System
5. Cooperative Mobile Traffic Offloading in Mobile Edge Computing for 5G HetNet IoT Applications
6. AI-enabled privacy-preservation phrase with multi-keyword ranked searching for sustainable edge-cloud networks in the era of industrial IoT
7. Drone of IoT in 6G Wireless Communications: Technology, Challenges, and Future Aspects
8. Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements
9. Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems
10. Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care
11. Privacy Preserving Based on Seamless Authentication with Provable Key Verification using mIoMT for B5G-enabled Healthcare Systems
12. Secure-user sign-in authentication for IoT-based eHealth systems
13. Medical sensor capabilities in smart cloud networks: state-of-the-art approaches
14. Grid Energy Scenario and Storage Systems for the Vehicle-to-Grid Technology
15. An Enablement Platform for an Internet of Things Application: A Business Model
16. Drone of IoT in 6G Wireless Communications: Technology, Challenges, and Future Aspects
17. QuChain: On the Security and Privacy of Peer-to-Peer System using Blind Quantum Computation
18. EEI-IoT: Edge-Enabled Intelligent IoT Framework for Early Detection of COVID-19 Threats
19. Federated Learning-Based Lightweight Two-Factor Authentication Framework with Privacy Preservation for Mobile Sink in the Social IoMT
20. A Comprehensive Survey on Authentication and Secure Key Management in Internet of Things: Challenges, Countermeasures, and Future Directions
21. Healthcare Applications Using Blockchain with a Cloud-Assisted Decentralized Privacy-Preserving Framework
22. TAB-SAPP: A Trust-Aware Blockchain-Based Seamless Authentication for Massive IoT-Enabled Industrial Applications
23. In the Digital Age of 5G Networks: Seamless Privacy-Preserving Authentication for Cognitive-Inspired Internet of Medical Things
24. Secure-user sign-in authentication for IoT-based eHealth systems.
25. A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems
26. A Proxy-Authorized Public Auditing Scheme for Cyber-Medical Systems Using AI-IoT
27. Analyzing Threefold Schemes for Enhancing Communication Channel Efficiencies Using IP Multimedia Server–Client Systems for LTE Networks
28. Evaluating Three Party Authentication and Key Agreement Protocols Using IP Multimedia Server–Client Systems
29. Security and privacy issues in smart cities/industries: technologies, applications, and challenges
30. Lightweight Blockchain Based Remote Mutual Authentication for AI-Empowered IoT Sustainable Computing Systems
31. Digital‐twin assisted: Fault diagnosis using deep transfer learning for machining tool condition.
32. Dynamic-Driven Congestion Control and Segment Rerouting in the 6G-Enabled Data Networks
33. How to Exploit 5G Networks for IoT e-Health Security and Privacy Challenges
34. Digital‐twin assisted: Fault diagnosis using deep transfer learning for machining tool condition
35. Seamless Authentication: For IoT-Big Data Technologies in Smart Industrial Application Systems
36. Smart Mutual Authentication Protocol for Cloud Based Medical Healthcare Systems Using Internet of Medical Things
37. Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care
38. An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT
39. Energy Aware Resource Allocation in Multi-Hop Multimedia Routing via the Smart Edge Device
40. Analyzing enhanced real-time uplink scheduling algorithm in 3GPP LTE-advanced networks using multimedia systems
41. Evaluating Three Party Authentication and Key Agreement Protocols Using IP Multimedia Server–Client Systems
42. Interoperation Key Schema for Social Media Tools in IP Multimedia Subsystem
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.