38 results on '"Shamshad, Salman"'
Search Results
2. Robust and efficient three-factor authentication solution for WSN-based industrial IoT deployment
3. An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF
4. On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
5. An enhanced scheme for mutual authentication for healthcare services
6. Cost-effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT)
7. A Cost-Efficient Anonymous Authenticated and Key Agreement Scheme for V2I-Based Vehicular Ad-Hoc Networks
8. PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communication
9. A secure blockchain-based e-health records storage and sharing scheme
10. Comments on “A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things”
11. Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture
12. Cloud-Assisted Secure and Cost-Effective Authenticated Solution for Remote Wearable Health Monitoring System
13. Provably Secure Conditional-Privacy Access Control Protocol for Intelligent Customers-Centric Communication in VANET
14. Secure Consumer-Centric Demand Response Management in Resilient Smart Grid as Industry 5.0 Application With Blockchain-Based Authentication
15. A Neural Computing-Based Access Control Protocol for AI-Driven Intelligent Flying Vehicles in Industry 5.0-Assisted Consumer Electronics
16. Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture
17. A Provably Secure Lightweight Key Agreement Protocol for Wireless Body Area Networks in Healthcare System
18. Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System
19. A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment
20. A Neural Computing-based Access Control Protocol for AI-driven Intelligent Flying Vehicles in Industry 5.0-assisted Consumer Electronics
21. Provably Secure Conditional-Privacy Access Control Protocol for Intelligent Customers-centric Communication in VANET
22. A Provably Secure and Lightweight Access Control Protocol for EI-based Vehicle to Grid Environment
23. Secure Consumer-Centric Demand Response Management in Resilient Smart Grid as Industry 5.0 Application With Blockchain-Based Authentication
24. An Efficient and Physically Secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network
25. A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance
26. An Identity-Based Authentication Protocol for the Telecare Medical Information System (TMIS) Using a Physically Unclonable Function
27. An Efficient Privacy-Preserving Authenticated Key Establishment Protocol for Health Monitoring in Industrial Cyber–Physical Systems
28. A Provably Secure Mobile User Authentication Scheme for Big Data Collection in IoT-Enabled Maritime Intelligent Transportation System
29. A Privacy-Preserving Access Control Protocol for Consumer Flying Vehicles in Smart City Applications
30. Security Analysis on “A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems”
31. On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
32. Signcryption Based Authenticated and Key Exchange Protocol for EI-Based V2G Environment
33. An Identity Based Authentication Protocol for Smart Grid Environment Using Physical Uncloneable Function
34. A Provably Secure Mobile User Authentication Scheme for Big Data Collection in IoT-Enabled Maritime Intelligent Transportation System
35. On the Security of a Lightweight Privacy-Preserving Authentication Protocol for VANETs
36. Comments on “Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC”
37. Comment on “Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication”
38. A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.