Search

Your search keyword '"Saru Kumari"' showing total 312 results

Search Constraints

Start Over You searched for: Author "Saru Kumari" Remove constraint Author: "Saru Kumari"
312 results on '"Saru Kumari"'

Search Results

1. Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture

2. An enhanced scheme for mutual authentication for healthcare services

3. Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology

4. Toward a Secure Smart-Home IoT Access Control Scheme Based on Home Registration Approach

5. AMAPG: Advanced Mobile Authentication Protocol for GLOMONET

6. Questioning the Security of Three Recent Authentication and Key Agreement Protocols

7. Practical Identity Based Online/Off-Line Signcryption Scheme for Secure Communication in Internet of Things

8. Anonymous Key-Agreement Protocol for V2G Environment Within Social Internet of Vehicles

9. An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks

10. Lightweight Authentication Protocol for NFC Based Anti-Counterfeiting System in IoT Infrastructure

11. An Enhanced Authentication Protocol for RFID Systems

12. A Lightweight Key Agreement and Authentication Scheme for Satellite-Communication Systems

13. CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC

14. A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid

15. A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments

16. RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications

17. Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm

18. An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT

19. Verifier-based anonymous password-authenticated key exchange protocol in the standard model

20. Design of a Secure Password-Based Authentication Scheme for M2M Networks in IoT Enabled Cyber-Physical Systems

21. SPSR-FSPG: A Fast Simulative Password Set Generation Algorithm

22. Questioning Key Compromise Attack on Ostad-Sharif et al.’s Authentication and Session key Generation Scheme for Healthcare Applications

23. SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing

24. LAP-IoHT: A Lightweight Authentication Protocol for the Internet of Health Things

25. Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments

26. Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks

27. An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments

28. Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks

29. An Improved Smart Card Based Remote user Authentication Scheme with Session Key Agreement During the Verification Phase

30. An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks

33. Blockchain-Oriented Data Exchange Protocol With Traceability and Revocation for Smart Grid

36. Deep Semantics Sorting of Voice-Interaction-Enabled Industrial Control System

47. An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing

49. Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message

Catalog

Books, media, physical & digital resources