30 results on '"Rostampour, Samad"'
Search Results
2. Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures
3. Improving RFID/IoT-based generalized ultra-lightweight mutual authentication protocols
4. IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity
5. ECCbAP: A secure ECC-based authentication protocol for IoT edge devices
6. The Rise of Passive RFID RTLS Solutions in Industry 5.0.
7. Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures
8. Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures
9. Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol.
10. An improved low-cost yoking proof protocol based on Kazahaya’s flaws
11. Using a Privacy-Enhanced Authentication Processto Secure IoT-based Smart Grid Infrastructures
12. An Authentication Protocol for Next Generation of Constrained IoT Systems
13. A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications
14. On the (Im)Possibility of Receiving Security Beyond 2 l Using an l-Bit PRNG
15. Design et développement d’un prototype de magasin connecté pour les petites entreprises
16. Selecting the right IoT technologies to build a connected bus shelter for smart cities
17. IoT Device Security: Challenging “A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function”
18. An improved low-cost yoking proof protocol based on Kazahaya’s flaws
19. On the security of an RFID‐based parking lot management system
20. An authenticated encryption based grouping proof protocol for RFID systems
21. On the (Im)Possibility of Receiving Security Beyond 2 l Using an l-Bit PRNG
22. A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications.
23. On the (Im)Possibility of Receiving Security Beyond 2 Using an l-Bit PRNG.
24. A Novel Mutual RFID Authentication Protocol with Low Complexity and High Security
25. New secure and low-cost design for defense in depth implementation using open source software
26. On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol.
27. New secure and low-cost design for defense in depth implementation using open source software
28. Novel algorithm by low complexity filter on retinal vessel segmentation
29. A Numerical Solution for Throughput Improvement of On-chip Irregular Mesh Interconnection Network.
30. Novel algorithm by low complexity filter on retinal vessel segmentation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.