Author of the publication

A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications.

, , , , , and . Secur. Priv., (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System., , , , , and . IEEE Trans. Veh. Technol., 70 (2): 1736-1751 (2021)A blockchain based secure communication framework for community interaction., , and . J. Inf. Secur. Appl., (2021)A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography., , , and . Wireless Personal Communications, 91 (3): 1361-1391 (2016)Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges., , , , and . IEEE Access, (2020)iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment., , , , and . IEEE Access, (2021)SCS-WoT: Secure Communication Scheme for Web of Things Deployment., , , and . IEEE Internet Things J., 9 (13): 10411-10423 (2022)Explainable artificial intelligence envisioned security mechanism for cyber threat hunting., , , , , , and . Secur. Priv., (November 2023)Performance of a LAN under different ethernet wiring standards., , and . CUBE, page 166-172. ACM, (2012)Design of a Secure Machine Learning-Based Malware Detection and Analysis Scheme., , , , , and . CCCI, page 1-8. IEEE, (2023)Robust authenticated key agreement protocol for internet of vehicles-envisioned intelligent transportation system., , , , and . J. Syst. Archit., (September 2023)