Search

Your search keyword '"Rodrigues, Joel J. P. C."' showing total 79 results

Search Constraints

Start Over You searched for: Author "Rodrigues, Joel J. P. C." Remove constraint Author: "Rodrigues, Joel J. P. C." Topic security Remove constraint Topic: security
79 results on '"Rodrigues, Joel J. P. C."'

Search Results

8. Bilinear pairing-based access control and key agreement scheme for smart transportation.

9. Explainable artificial intelligence envisioned security mechanism for cyber threat hunting.

10. MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach.

11. Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation.

12. PSSCC: Provably secure communication framework for crowdsourced industrial Internet of Things environments.

13. An Anonymous Batch Authentication and Key Exchange Protocols for 6G Enabled VANETs.

14. AN IMPROVED SECURITY FRAMEWORK IN HEALTH CARE USING HYBRID COMPUTING.

15. SDN‐chain: Privacy‐preserving protocol for software defined networks using blockchain.

16. The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface.

17. Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications.

18. Artificial Intelligence Technologies for COVID-19-Like Epidemics: Methods and Challenges.

19. Software‐defined networking security for private data center networks and clouds: Vulnerabilities, attacks, countermeasures, and solutions.

20. A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption.

21. On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment.

22. TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment.

23. Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective.

24. Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications.

25. A hybrid NFC-Bluetooth secure protocol for credit transfer among mobile phones

26. On the design of secure user authenticated key management scheme for multigateway‐based wireless sensor networks using ECC.

27. Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment.

28. A Trust Cloud Model for Underwater Wireless Sensor Networks.

29. A secure NFC application for credit transfer among mobile phones.

30. Lightweight Failover Authentication Mechanism for IoT-Based Fog Computing Environment.

31. Data Protection Impact Assessment (DPIA) for Cloud-Based Health Organizations.

32. Enhancing Key Management in LoRaWAN with Permissioned Blockchain.

33. Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment.

34. RAD‐EI: A routing attack detection scheme for edge‐based Internet of Things environment.

35. Amateur Drone Surveillance: Applications, Architectures, Enabling Technologies, and Public Safety Issues: Part 1.

36. Privacy and Security Issues in Online Social Networks.

38. A Secure DBA Management System: A Comprehensive Study

39. Application of Truffle Suite in a Blockchain Environment

40. On Efficient and Secure Multi-access Edge Computing for Internet of Things

41. CSBRCA: Cloud Security Breaches and Its Root Cause Analysis

42. A Comparative Study of Security Issues and Attacks on Underwater Sensor Network

44. C2B-SCHMS: Cloud Computing and Bots Security for COVID-19 Data and Healthcare Management Systems

45. Detection and Prevention of DoS and DDoS in IoT

46. The Amalgamation of Blockchain and IoT: A Survey

47. Secure Group Data Sharing with an Efficient Key Management without Re-Encryption Scheme in Cloud Computing

48. Instinctive and Effective Authorization for Internet of Things

49. Establishing Trust in the Cloud Using Machine Learning Methods

50. Designing a Transformational Model for Decentralization of Electronic Health Record Using Blockchain

Catalog

Books, media, physical & digital resources