773 results on '"Kumari, Saru"'
Search Results
2. Fick’s Law Algorithm with Gaussian Mutation: Design and Analysis
3. Flaws of a Password-Based Three-Party Authenticated Key Agreement Protocol in Post-quantum Environment
4. Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures
5. An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring
6. Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system
7. Digital twin-assisted service function chaining in multi-domain computing power networks with multi-agent reinforcement learning
8. SL3PAKE: Simple Lattice-based Three-party Password Authenticated Key Exchange for post-quantum world
9. Secure personal-health-records searching in edge-based Internet of Medical Things through plaintext checkable encryption
10. χperbp: a cloud-based lightweight mutual authentication protocol
11. Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures
12. Decoding the third dimension in the metaverse: A comprehensive method for reconstructing 2D NFT portraits into 3D models
13. Cross-modal interaction and multi-source visual fusion for video generation in fetal cardiac screening
14. Towards classification and comprehensive analysis of AI-based COVID-19 diagnostic techniques: A survey
15. Industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training
16. Proxy re-encryption with plaintext checkable encryption for integrating digital twins into IIoT
17. Pairing-free certificateless public key encryption with equality test for Internet of Vehicles
18. Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture
19. Security Analysis of Two Authentication and Key Agreement Protocols Based on Wireless Sensor Networks
20. Comments on 'Two Authentication and Key Agreement Protocols in WSN Environments'
21. Privileged Insider Attacks on Two Authentication Schemes
22. To Analyze Security Requirements of Two AKA Protocols in WBAN and VANET
23. VQR: vulnerability analysis in quadratic residues-based authentication protocols
24. Finger pinching and imagination classification: A fusion of CNN architectures for IoMT-enabled BCI applications
25. A Technical Report for Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment
26. Fog-based low latency and lightweight authentication protocol for vehicular communication
27. Enhanced privacy-preserving in student certificate management in blockchain and interplanetary file system
28. Systematic survey of mobile payments, protocols, and security infrastructure
29. PRS-HDMC: An online participant recruitment scheme for vehicular crowdsensing-enabled HD map collection
30. An energy and time-saving task scheduling algorithm for UAV-IoT collaborative system
31. Security Analysis of Two Authentication and Key Agreement Protocols Based on Wireless Sensor Networks
32. To Analyze Security Requirements of Two AKA Protocols in WBAN and VANET
33. Comments on “Two Authentication and Key Agreement Protocols in WSN Environments”
34. Privileged Insider Attacks on Two Authentication Schemes
35. Blockchain-based privacy-preserving authentication protocol for UAV networks
36. A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios
37. A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment
38. RAKS: robust authentication and key agreement scheme for satellite infrastructure
39. A provably secure lightweight authentication protocol in mobile edge computing environments
40. Efficient plaintext checkable identity‐based signcryption in cyber‐physical systems towards IIoT
41. An authentication and key agreement scheme for smart grid
42. Guest editorial: Introduction to the special section on sustainable security solutions for Internet of Vehicles (VSI-iov)
43. An enhanced scheme for mutual authentication for healthcare services
44. Slight: A lightweight authentication scheme for smart healthcare services
45. Data Augmentation for Internet of Things Dialog System
46. Predicting airline customers’ recommendations using qualitative and quantitative contents of online reviews
47. A survey on Attribute-Based Signatures
48. Flaw and amendment of Dharminder et al.'s authentication protocol for satellite communication.
49. A trustworthy data collection approach from sensor nodes using trust score of mobile vehicles for smart city.
50. A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.