IMG

Semi-automated magnification of small motions in videos
Conference on Pattern Recognition and Machine Intelligence, PReMI, 2013
Core Rank : - Google Rank :-
Time-frequency analysis based motion detection in perfusion weighted MRI
National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics, NCVPRIPG, 2013
Core Rank : - Google Rank :-
A novel proxy signature scheme based on user hierarchical access control policy
Journal of King Saud University - Computer and Information Sciences, JKSU-CIS, 2013
Core Rank : - Google Rank :89
An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System
Journal of Medical Systems, JMs, 2013
Core Rank : - Google Rank :74
LHSC: an effective dynamic key management scheme for linear hierarchical access control
International Conference on Communication Systems & Networks, COMSNETS, 2013
Core Rank : - Google Rank :28
Analysis and Formal Security Verification of Access Control Schemes in Wireless Sensor Networks: A Critical Survey.
Journal of Information Assurance & Security, JIAS, 2013
Core Rank : - Google Rank :-
A biometric-based user authentication scheme for heterogeneous wireless sensor networks
International Conference on Advanced Information Networking and Applications Workshops, AINA-W, 2013
Core Rank : - Google Rank :20
An effective and secure key-management scheme for hierarchical access control in e-medicine system
Journal of Medical Systems, JMs, 2013
Core Rank : - Google Rank :74
A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
Journal of Medical Systems, JMs, 2013
Core Rank : - Google Rank :74
Formal security verification of a dynamic password-based user authentication scheme for hierarchical wireless sensor networks
International Journal of Trust Management in Computing and Communications, IJTMCC, 2013
Core Rank : - Google Rank :-