IMG

Search results (354) found.
Authentication Protocols for the Internet of Drones: Taxonomy, Analysis and Future Directions
Journal on Ambient Intelligence and Humanized Computing, JAIHC, 2018
Core Rank : - Google Rank :-
Secure Healthcare Data Dissemination Using Vehicle Relay Networks
IEEE Internet of Things Journal, IOT, 2018
Core Rank : - Google Rank :186
Authenticated key management protocol for cloud-assisted body area sensor networks
Journal on Network and Computer Applications, JNCA, 2018
Core Rank : A
Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment
IEEE Internet of Things Journal, IOT, 2018
Core Rank : - Google Rank :186
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks.
IACR Cryptology ePrint Archive, CEA, 2018
Core Rank : - Google Rank :-
HEAP: An Efficient and Fault-tolerant Authentication and Key Exchange Protocol for Hadoop-assisted Big Data Platform
IEEE Access, ACCESS, 2018
Core Rank : - Google Rank :266
Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
IEEE Internet of Things Journal, IOT, 2018
Core Rank : - Google Rank :186
Authentication in cloud-driven IoT-based big data environment: Survey and outlook
Journal of Systems Architecture, JSA, 2018
Core Rank : - Google Rank :54
SecSVA: secure storage, verification, and auditing of big data in the cloud environment
IEEE Communications Magzine, CM, 2018
Core Rank : - Google Rank :94
Providing healthcare-as-a-service using fuzzy rule based big data analytics in cloud computing
IEEE Journal of Biomedical and Health Informatics, JBioHI, 2018
Core Rank : - Google Rank :103