210 results on '"Omar, Mawloud"'
Search Results
2. Highly efficient approach for discordant BSMs detection in connected vehicles environment
3. IFKMS: Inverse Function-based Key Management Scheme for IoT networks
4. Ultra-safe and reliable enhanced train-centric communication-based train control system
5. Secure Data Processing for Industrial Remote Diagnosis and Maintenance
6. Autonomous Vehicle Security: Literature Review of Real Attack Experiments
7. Efficient and Lightweight Polynomial-Based Key Management Scheme for Dynamic Networks
8. Efficient and lightweight protocol for anti-jamming communications in wireless body area networks
9. Secure and Efficient Key Exchange Mechanism for Heterogeneous Connected Objects
10. Corrigendum to “An extended Attribute-based access control with controlled delegation in IoT” [Journal of Information Systems and Applications 76 (2023) 103473]
11. Reliable and Adaptive Distributed Public-Key Management Infrastructure for the Internet of Things
12. Energy-aware key management and access control for the Internet of things
13. An efficient biometric-based continuous authentication scheme with HMM prehensile movements modeling
14. Robust multimodal biometric authentication on IoT device through ear shape and arm gesture
15. Characterizing and using gullibility, competence, and reciprocity in a very fast and robust trust and distrust inference algorithm for weighted signed social networks
16. Secure and efficient pseudonymization for privacy-preserving vehicular communications in smart cities
17. Matrix-based key management scheme for IoT networks
18. Efficient and Lightweight Polynomial-Based Key Management Scheme for Dynamic Networks
19. Context-aware pseudonymization and authorization model for IoT-based smart hospitals
20. A very fast and robust trust inference algorithm in weighted signed social networks using controversy, eclecticism, and reciprocity
21. Dissimulation-based and load-balance-aware routing protocol for request and event oriented mobile wireless sensor networks
22. A robust trust inference algorithm in weighted signed social networks based on collaborative filtering and agreement as a similarity metric
23. Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET
24. An energy efficient and QoS aware routing protocol for wireless sensor and actuator networks
25. Context-aware negotiation, reputation and priority traffic light management protocols for VANET-based smart cities
26. Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments
27. Secure and efficient ECG-based authentication scheme for medical body area sensor networks
28. Authenticated semi-quantum key distribution without entanglement
29. QoS-based routing in Wireless Body Area Networks: a survey and taxonomy
30. Reliable and secure X2V energy trading framework for highly dynamic connected electric vehicles
31. Secure and reliable certificate chains recovery protocol for mobile ad hoc networks
32. On-demand source routing with reduced packets protocol in mobile ad-hoc networks
33. User Mobility Dataset for 5G Networks Based on GPS Geolocation
34. A Behavioral Modeling-based Driver Authentication Approach for Smart Cars Self-Surveillance
35. Safety-Oriented Train Control Systems Monitoring in Smart Railway Transportation: A Review
36. Methods for detecting and removing ocular artifacts from EEG signals in drowsy driving warning systems: A survey
37. Secure and distributed certification system architecture for safety message authentication in VANET
38. Highly efficient approach for discordant BSMs detection in connected vehicles environment
39. Deterministic MDI QKD with two secret bits per shared entangled pair
40. Lightweight Sharing Scheme for Data Integrity Protection in WSNs
41. Reliable and energy aware query-driven routing protocol for wireless sensor networks
42. Ultra-Lightweight and Secure Intrusion Detection System for Massive-IoT Networks
43. Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
44. Toward a lightweight machine learning based solution against cyber-intrusions for IoT
45. A Privacy-Preserving Authentication Model Based on Anonymous Certificates in IoT
46. CHEARP: Chord-based hierarchical energy-aware routing protocol for wireless sensor networks
47. Multiuser Access via OFDMA Technology in High Density IEEE 802.11ax WLANs: A Survey
48. CA-ADP: Context-Aware Authorization and Delegation Protocol for IoT-based healthcare smart systems
49. Securing Vehicular Platooning against Vehicle Platooning Disruption (VPD) Attacks
50. Automatic removal of ocular artifacts in EEG signals for driver's drowsiness detection: a survey
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.