IMG

Search results (348) found.
Secure Remote User Mutual Authentication Scheme with KeyAgreement for Cloud Environment
Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Saru Kumari, Fan Wu, Shehzad Ashraf Chaudhry, R. Niranchana
Mobile Networks and Applications, MONET, 2018
Core Rank : - Google Rank :57
2PAKEP: Provably Secure and Efficient Two-party Authenticated Key Exchange Protocol for Mobile Environment
Kisung Park, Youngho Park, Yohan Park, Ashok Kumar Das
IEEE Access, ACCESS, 2018
Core Rank : - Google Rank :266
Taxonomy and Analysis of Security Protocols for Internet of Things
Ashok Kumar Das, Sheralizeadally, Debiao He
Future Generation Computer Systems, FGCS, 2018
Core Rank : - Google Rank :146
Provably Secure Multi-Server Authentication Protocol using Fuzzy Commitment
Subhas Barman, Ashok Kumar Das, Debasis Samanta, Samiran Chattopadhyay, Joel J. P. C. Rodrigues, Youngho Park
IEEE Access, ACCESS, 2018
Core Rank : - Google Rank :266
Authentication Protocols for the Internet of Drones: Taxonomy, Analysis and Future Directions
Mohammad Wazid, Ashok Kumar Das, Jong‑hyouk Lee
Journal on Ambient Intelligence and Humanized Computing, JAIHC, 2018
Core Rank : - Google Rank :-
Secure Healthcare Data Dissemination Using Vehicle Relay Networks
Prabhjot Singh, Rasmeet Singh Bali, Neeraj Kumar, Ashok Kumar Das, Alexey Vinel, Laurence T. Yang
IEEE Internet of Things Journal, IOT, 2018
Core Rank : - Google Rank :186
Authenticated key management protocol for cloud-assisted body area sensor networks
Mohammad Wazid, Ashok Kumar Das, Athanasios V.vasilakos
Journal on Network and Computer Applications, JNCA, 2018
Core Rank : A
Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment
Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues
IEEE Internet of Things Journal, IOT, 2018
Core Rank : - Google Rank :186
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks.
Behnam Zahednejad, Majid Bayat, Ashok Kumar Das
IACR Cryptology ePrint Archive, CEA, 2018
Core Rank : - Google Rank :-
HEAP: An Efficient and Fault-tolerant Authentication and Key Exchange Protocol for Hadoop-assisted Big Data Platform
Durbadal Chattaraj, Monalisa Sarma, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues, Youngho Park
IEEE Access, ACCESS, 2018
Core Rank : - Google Rank :266