Author of the publication

An Efficient Web Authentication Mechanism Preventing Man-In-The-Middle Attacks in Industry 4.0 Supply Chain.

, , , , , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Web Authentication Mechanism Preventing Man-In-The-Middle Attacks in Industry 4.0 Supply Chain., , , , , , , and . IEEE Access, (2019)A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment., , , , , , , , , and . IEEE Internet Things J., 6 (1): 288-296 (2019)An efficient MAC-based scheme against pollution attacks in XOR network coding-enabled WBANs for remote patient monitoring systems., , , , and . EURASIP J. Wirel. Commun. Netw., (2016)A Novel Intrusion Detection and Prevention Scheme for Network Coding-Enabled Mobile Small Cells., , , , , , and . IEEE Trans. Comput. Social Systems, 6 (6): 1467-1477 (2019)PriLok: Citizen-protecting distributed epidemic tracing., , , , and . CoRR, (2020)An Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC., , and . IEEE Communications Letters, 20 (5): 918-921 (2016)Machine Learning to Automate Network Segregation for Enhanced Security in Industry 4.0., , , , , , and . BROADNETS, volume 263 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 149-158. Springer, (2018)A null space-based MAC scheme against pollution attacks to Random linear Network Coding., , , , and . ICC Workshops, page 1521-1526. IEEE, (2015)A Location-aware IDPS scheme for Network Coding-enabled Mobile Small Cells., , , , and . 5G World Forum, page 91-96. IEEE, (2019)An efficient MAC-signature scheme for authentication in XOR network coding., , , and . ISCC, page 1-5. IEEE Computer Society, (2014)