IMG

Search results (301) found.
An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks
Mohammad Wazid, Ashok Kumar Das
Wireless Personal Communications, WPC, 2016
Core Rank : - Google Rank :74
An efficient fast algorithm for discoverin closed+highutility itemsets
Jayakrushna Sahoo, Ashok Kumar Das, A. Goswami
Applied Intelligence, APIN, 2016
Core Rank : - Google Rank :86
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
Ashok Kumar Das
Peer to Peer Networking and Applications, PPNA, 2016
Core Rank : - Google Rank :53
A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay
Peer to Peer Networking and Applications, PPNA, 2016
Core Rank : - Google Rank :53
Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS
Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li, Fan Wu
Security and Communication Networks, SCNW, 2016
Core Rank : - Google Rank :56
Lightweight authentication with key-agreement protocol for mobile network environment using smartcards
Alavalapati Goutham Reddy, Eun-jun Yoon, Ashok Kumar Das, Kee-young Yoo
IET Information Security, INS, 2016
Core Rank : - Google Rank :24
An efficient multi-gateway based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid, Xiong Li
Security and Communication Networks, SCNW, 2016
Core Rank : - Google Rank :56
Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor
Sk Hafizul Islam, Ashok Kumar Das, Muhammad Khurram Khan
Security and Communication Networks, SCNW, 2016
Core Rank : - Google Rank :56
Design of a secure smart card-based multi-server authentication scheme
Ankita Chaturvedi, Ashok Kumar Das, Dheerendra Mishra, Sourav Mukhopadhyay
Journal of Information Security and Applications, JISA, 2016
Core Rank : - Google Rank :65
Provably secure user authentication and key agreement scheme for wireless sensor networks
Ashok Kumar Das, Saru Kumari, Vanga Odelu, Xiong Li, Fan Wu, Xinyi Huang
Security and Communication Networks, SCNW, 2016
Core Rank : - Google Rank :56