IMG

An Effective Mechanism for Phishing Attack Detection
International Wireless Communications and Mobile Computing Conference, IWCMC, 2024
Core Rank : B Google Rank :35
Designing Secure Big Data Analytics Mechanism Using Authentication for Drones-Assisted Military Applications
IEEE Conference on Computer Communications Workshops, INFOCOM-W, 2024
Core Rank : - Google Rank :-
Secure Location-Based Authenticated Key Establishment Scheme for Maritime Communication
International Conference on Communications, ICC, 2024
Core Rank : - Google Rank :76
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security
IEEE Access, ACCESS, 2024
Core Rank : - Google Rank :266
Privacy-Preserving Electronic Medical Record Sharing for IoT-Enabled Healthcare System Using Fully Homomorphic Encryption, IOTA, and Masked Authenticated Messaging
IEEE Transactions on Industrial Informatics, TII, 2024
Core Rank : - Google Rank :167
A Secure and Privacy-Preserving Signature Protocol Using Quantum Teleportation in Metaverse Environment
IEEE Access, ACCESS, 2024
Core Rank : - Google Rank :266
Digital Twins-Empowered Secure Network Slice Access and Isolation for Consumer Healthcare Applications
IEEE Transactions Services Computing, TSC, 2024
Core Rank : - Google Rank :66
A Secure Self-Certified Broadcast Authentication Protocol for Intelligent Transportation Systems in UAV-assisted Mobile Edge Computing Environments
IEEE Transactions on Intelligent Transportation Systems, ITS, 2024
Core Rank : - Google Rank :143
Quantum Secure Authentication Scheme for Internet of Medical Things Using Blockchain
IEEE Internet of Things Journal, IOT, 2024
Core Rank : - Google Rank :186
Provably Secure and Lightweight Authentication and Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks
IEEE Transactions on Intelligent Transportation Systems, ITS, 2024
Core Rank : - Google Rank :143