Ashok Kumar Das

Orcid: 0000-0002-5196-9589

Affiliations:
  • International Institute of Information Technology (IIIT), Center for Security, Theory and Algorithmic Research, Hyderabad, India
  • Old Dominion University, Suffolk, VA 23435, USA (2022)
  • International Institute of Information Technology, Bhubaneswar, India, Department of Computer Science and Engineering (2008-2010)
  • Indian Institute of Technology Kharagpur, India, Department of Computer Science and Engineering (PhD, 2008)
  • Centre for Development of Telematics (C-DOT), New Delhi, India (2000-2004)


According to our database1, Ashok Kumar Das authored at least 361 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-Based Efficient Access Control With Handover Policy in IoV-Enabled Intelligent Transportation System.
IEEE Trans. Veh. Technol., March, 2024

Secure Cyber Engineering for IoT-Enabled Smart Healthcare System.
IEEE Internet Things Mag., March, 2024

A Security-Enhanced and Ultralightweight Communication Protocol for Internet of Medical Things.
IEEE Internet Things J., March, 2024

Design of Blockchain and ECC-Based Robust and Efficient Batch Authentication Protocol for Vehicular Ad-Hoc Networks.
IEEE Trans. Intell. Transp. Syst., January, 2024

Role of IoT in the Ages of Digital to Smart Cities: Security Challenges and Countermeasures.
IEEE Internet Things Mag., January, 2024

Quantum Secure Threshold Private Set Intersection Protocol for IoT-Enabled Privacy-Preserving Ride-Sharing Application.
IEEE Internet Things J., January, 2024

A characterization of unit interval bigraphs of open and closed intervals.
Discret. Appl. Math., January, 2024

ACKS-IA: An Access Control and Key Agreement Scheme for Securing Industry 4.0 Applications.
IEEE Trans. Netw. Sci. Eng., 2024

Designing access control security protocol for Industry 4.0 using Blockchain-as-a-Service.
Secur. Priv., 2024

A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications.
Secur. Priv., 2024

Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey.
Secur. Priv., 2024

ECC-EXONUM-eVOTING: A Novel Signature-Based e-Voting Scheme Using Blockchain and Zero Knowledge Property.
IEEE Open J. Commun. Soc., 2024

Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security.
IEEE Access, 2024

2023
Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System.
IEEE Trans. Intell. Transp. Syst., December, 2023

Design of blockchain-enabled secure smart health monitoring system and its testbed implementation.
Cyber Secur. Appl., December, 2023

Bilinear pairing-based access control and key agreement scheme for smart transportation.
Cyber Secur. Appl., December, 2023

Secure access privilege delegation using attribute-based encryption.
Int. J. Inf. Sec., October, 2023

On the design of an AI-driven secure communication scheme for internet of medical things environment.
Digit. Commun. Networks, October, 2023

A New Scalable and Secure Access Control Scheme Using Blockchain Technology for IoT.
IEEE Trans. Netw. Serv. Manag., September, 2023

Robust authenticated key agreement protocol for internet of vehicles-envisioned intelligent transportation system.
J. Syst. Archit., September, 2023

A Provably Secure and Lightweight Access Control Protocol for EI-Based Vehicle to Grid Environment.
IEEE Internet Things J., September, 2023

Public Blockchain-Envisioned Security Scheme Using Post Quantum Lattice-Based Aggregate Signature for Internet of Drones Applications.
IEEE Trans. Veh. Technol., August, 2023

SUACC-IoT: secure unified authentication and access control system based on capability for IoT.
Clust. Comput., August, 2023

An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF.
Internet Things, July, 2023

MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach.
Multim. Syst., June, 2023

Designing attribute-based verifiable data storage and retrieval scheme in cloud computing environment.
J. Inf. Secur. Appl., June, 2023

Private Blockchain-Based AI-Envisioned Home Monitoring Framework in IoMT-Enabled COVID-19 Environment.
IEEE Consumer Electron. Mag., May, 2023

Secure authentication protocol for home area network in smart grid-based smart cities.
Comput. Electr. Eng., May, 2023

Robust Certificateless Authentication Protocol for the SAE J1939 Commercial Vehicles Bus.
IEEE Trans. Veh. Technol., April, 2023

Blockchain-Enabled Secure Big Data Analytics for Internet of Things Smart Applications.
IEEE Internet Things J., April, 2023

LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks.
Comput. Networks, April, 2023

Security in IoT-enabled smart agriculture: architecture, security solutions and challenges.
Clust. Comput., April, 2023

ASPA-MOSN: An Efficient User Authentication Scheme for Phishing Attack Detection in Mobile Online Social Networks.
IEEE Syst. J., March, 2023

A new robust and fragile scheme based on chaotic maps and dwt for medical image security.
Multim. Tools Appl., March, 2023

A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT.
J. Syst. Archit., March, 2023

Post Quantum Lattice-Based Secure Framework using Aggregate Signature for Ambient Intelligence Assisted Blockchain-Based IoT Applications.
IEEE Internet Things Mag., March, 2023

SINN-RD: Spline interpolation-envisioned neural network-based ransomware detection scheme.
Comput. Electr. Eng., March, 2023

A Provably Secure Mobile User Authentication Scheme for Big Data Collection in IoT-Enabled Maritime Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., February, 2023

BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare.
IEEE Trans. Consumer Electron., February, 2023

Post-Quantum Lattice-Based Secure Reconciliation Enabled Key Agreement Protocol for IoT.
IEEE Internet Things J., February, 2023

Mobile-Chain: Secure blockchain based decentralized authentication system for global roaming in mobility networks.
Comput. Commun., February, 2023

Securing Age-of-Information (AoI)-Enabled 5G Smart Warehouse Using Access Control Scheme.
IEEE Internet Things J., January, 2023

Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023

AISCM-FH: AI-Enabled Secure Communication Mechanism in Fog Computing-Based Healthcare.
IEEE Trans. Inf. Forensics Secur., 2023

Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks.
IEEE Trans. Inf. Forensics Secur., 2023

BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments.
IEEE Trans. Dependable Secur. Comput., 2023

Blockchain-Based Data Access Control and Key Agreement System in IoT Environment.
Sensors, 2023

Explainable artificial intelligence envisioned security mechanism for cyber threat hunting.
Secur. Priv., 2023

A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges.
Secur. Priv., 2023

An Ensemble-Based IoT-Enabled Drones Detection Scheme for a Safe Community.
IEEE Open J. Commun. Soc., 2023

Efficient Personal-Health-Records Sharing in Internet of Medical Things Using Searchable Symmetric Encryption, Blockchain, and IPFS.
IEEE Open J. Commun. Soc., 2023

Provably secure public key encryption with keyword search for data outsourcing in cloud environments.
J. Syst. Archit., 2023

Fog-Based Single Sign-On Authentication Protocol for Electronic Healthcare Applications.
IEEE Internet Things J., 2023

Obstruction characterization of co-TT graphs.
CoRR, 2023

IIDS: Design of Intelligent Intrusion Detection System for Internet-of-Things Applications.
CoRR, 2023

Provably secure signature-based anonymous user authentication protocol in an Internet of Things-enabled intelligent precision agricultural environment.
Concurr. Comput. Pract. Exp., 2023

A hybrid ensemble machine learning model for detecting APT attacks based on network behavior anomaly detection.
Concurr. Comput. Pract. Exp., 2023

Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment.
Comput. Commun., 2023

Design of Robust Blockchain-Envisioned Authenticated Key Management Mechanism for Smart Healthcare Applications.
IEEE Access, 2023

An Efficient Lightweight Provably Secure Authentication Protocol for Patient Monitoring Using Wireless Medical Sensor Networks.
IEEE Access, 2023

An Effective Privacy-Preserving Blockchain-Assisted Security Protocol for Cloud-Based Digital Twin Environment.
IEEE Access, 2023

Design of Secure and Lightweight Authentication Scheme for UAV-Enabled Intelligent Transportation Systems Using Blockchain and PUF.
IEEE Access, 2023

Private Blockchain Envisioned Access Control System for Securing Industrial IoT-Based Pervasive Edge Computing.
IEEE Access, 2023

Blockchain Integration for IoT-Enabled V2X Communications: A Comprehensive Survey, Security Issues and Challenges.
IEEE Access, 2023

APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System.
IEEE Access, 2023

Security, Privacy and Trust for the Metaverse of Things.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Embattle The Security of E-Health System Through A Secure Authentication and Key Agreement Protocol.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Securing Fog Computing-based Industry 4.0 Communication Using Authenticated Key Agreement Scheme.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Cloud-Assisted Security Framework for Drone-Enabled Offshore Communications.
Proceedings of the IEEE INFOCOM 2023, 2023

An Efficient and Secure Post-Quantum Multi-Authority Ciphertext-Policy Attribute-Based Encryption Method Using Lattice.
Proceedings of the IEEE INFOCOM 2023, 2023

Multiclass Classification Approaches for Intrusion Detection in IoT-Driven Aerial Computing Environment.
Proceedings of the IEEE Global Communications Conference, 2023

A Survey of DDoS Attacks Detection Schemes in SDN Environment.
Proceedings of the International Conference on Computer, 2023

SLA-SCA: Secure and Lightweight Authentication and Key Agreement Mechanism for Smart City Applications.
Proceedings of the International Conference on Communications, 2023

Design of a Secure Machine Learning-Based Malware Detection and Analysis Scheme.
Proceedings of the International Conference on Communications, 2023

2022
SLAP-IoD: Secure and Lightweight Authentication Protocol Using Physical Unclonable Functions for Internet of Drones in Smart City Environments.
IEEE Trans. Veh. Technol., 2022

Blockchain-Envisioned Provably Secure Multivariate Identity-Based Multi-Signature Scheme for Internet of Vehicles Environment.
IEEE Trans. Veh. Technol., 2022

Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET.
IEEE Trans. Netw. Sci. Eng., 2022

EV-PUF: Lightweight Security Protocol for Dynamic Charging System of Electric Vehicles Using Physical Unclonable Functions.
IEEE Trans. Netw. Sci. Eng., 2022

KL-RAP: An Efficient Key-Less RFID Authentication Protocol Based on ECDLP for Consumer Warehouse Management System.
IEEE Trans. Netw. Sci. Eng., 2022

Authenticated Key Agreement Scheme With User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical Systems.
IEEE Trans. Intell. Transp. Syst., 2022

Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions.
Telecommun. Syst., 2022

Designing Secure and Efficient Biometric-Based Access Mechanism for Cloud Services.
IEEE Trans. Cloud Comput., 2022

Security in IoMT-driven smart healthcare: A comprehensive review and open challenges.
Secur. Priv., 2022

Chaotic neural networks and farfalle construction based parallel keyed secure hash function.
Secur. Priv., 2022

BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system.
J. Syst. Archit., 2022

DDoS attack resisting authentication protocol for mobile based online social network applications.
J. Inf. Secur. Appl., 2022

TACAS-IoT: Trust Aggregation Certificate-Based Authentication Scheme for Edge-Enabled IoT Systems.
IEEE Internet Things J., 2022

SCS-WoT: Secure Communication Scheme for Web of Things Deployment.
IEEE Internet Things J., 2022

Fortifying Smart Transportation Security Through Public Blockchain.
IEEE Internet Things J., 2022

An Efficient Privacy-Preserving Authenticated Key Establishment Protocol for Health Monitoring in Industrial Cyber-Physical Systems.
IEEE Internet Things J., 2022

PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey.
IEEE Internet Things J., 2022

AI-Envisioned Blockchain-Enabled Signature-Based Key Management Scheme for Industrial Cyber-Physical Systems.
IEEE Internet Things J., 2022

Designing Fine-Grained Access Control for Software-Defined Networks Using Private Blockchain.
IEEE Internet Things J., 2022

Access Control Protocol for Battlefield Surveillance in Drone-Assisted IoT Environment.
IEEE Internet Things J., 2022

Uniting cyber security and machine learning: Advantages, challenges and future research.
ICT Express, 2022

Blockchain-enabled secure communication mechanism for IoT-driven personal health records.
Trans. Emerg. Telecommun. Technol., 2022

Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for IoT applications.
Trans. Emerg. Telecommun. Technol., 2022

Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment.
Comput. Stand. Interfaces, 2022

On powers of circular arc graphs.
CoRR, 2022

Signed interval graphs and bigraphs: A generalization of interval graphs and bigraphs.
CoRR, 2022

On Hamiltonian-Connected and Mycielski graphs.
CoRR, 2022

Machine learning security attacks and defense approaches for emerging cyber physical applications: A comprehensive survey.
Comput. Commun., 2022

Towards achieving efficient access control of medical data with both forward and backward secrecy.
Comput. Commun., 2022

Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system.
Comput. Commun., 2022

Blockchain-based vehicular ad-hoc networks: A comprehensive survey.
Ad Hoc Networks, 2022

ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things.
IEEE Access, 2022

Healthcare 5.0 Security Framework: Applications, Issues and Future Research Directions.
IEEE Access, 2022

Privacy-Preserving Blockchain-Based Authentication in Smart Energy Systems.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

BAKP-IoDA: blockchain driven authentication and key agreement protocol for internet of drones based applications.
Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2022

BDESF-ITS: Blockchain-Based Secure Data Exchange and Storage Framework for Intelligent Transportation System.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT.
Wirel. Networks, 2021

Robust Authentication Protocol for Dynamic Charging System of Electric Vehicles.
IEEE Trans. Veh. Technol., 2021

Block-CLAP: Blockchain-Assisted Certificateless Key Agreement Protocol for Internet of Vehicles in Smart Transportation.
IEEE Trans. Veh. Technol., 2021

On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System.
IEEE Trans. Veh. Technol., 2021

Secure and Efficient Honey List-Based Authentication Protocol for Vehicular Ad Hoc Networks.
IEEE Trans. Netw. Sci. Eng., 2021

Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications.
IEEE Trans. Ind. Informatics, 2021

Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems.
IEEE Trans. Ind. Informatics, 2021

SFEEC: Provably Secure Signcryption-Based Big Data Security Framework for Energy-Efficient Computing Environment.
IEEE Syst. J., 2021

SDN-chain: Privacy-preserving protocol for software defined networks using blockchain.
Secur. Priv., 2021

Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters.
J. Syst. Archit., 2021

Blockchain-based batch authentication protocol for Internet of Vehicles.
J. Syst. Archit., 2021

Secure Communication Framework for Blockchain-Based Internet of Drones-Enabled Aerial Computing Deployment.
IEEE Internet Things Mag., 2021

AI and Blockchain-Based Cloud-Assisted Secure Vaccine Distribution and Tracking in IoMT-Enabled COVID-19 Environment.
IEEE Internet Things Mag., 2021

Securing Internet of Drones Networks Using AI-Envisioned Smart-Contract-Based Blockchain.
IEEE Internet Things Mag., 2021

Search on Encrypted COVID-19 Healthcare Data in Blockchain-Assisted Distributed Cloud Storage.
IEEE Internet Things Mag., 2021

Smart Contract-Based Blockchain-Envisioned Authentication Scheme for Smart Farming.
IEEE Internet Things J., 2021

Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System.
IEEE Internet Things J., 2021

Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function.
IEEE Internet Things J., 2021

Designing Blockchain-Based Access Control Protocol in IoT-Enabled Smart-Grid System.
IEEE Internet Things J., 2021

Cryptographic technologies and protocol standards for Internet of Things.
Internet Things, 2021

Software-defined networking security for private data center networks and clouds: Vulnerabilities, attacks, countermeasures, and solutions.
Int. J. Commun. Syst., 2021

Consortium blockchain-enabled access control mechanism in edge computing based generic Internet of Things environment.
Trans. Emerg. Telecommun. Technol., 2021

An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network.
Comput. Commun., 2021

Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment.
Comput. Commun., 2021

Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT.
Comput. Commun., 2021

AI-Enabled Blockchain-Based Access Control for Malicious Attacks Detection and Mitigation in IoE.
IEEE Consumer Electron. Mag., 2021

Comments on "ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes".
IEEE Access, 2021

Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap.
IEEE Access, 2021

On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks.
IEEE Access, 2021

iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment.
IEEE Access, 2021

On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure.
IEEE Access, 2021

Design and Testbed Experiments of Public Blockchain-Based Security Framework for IoT-Enabled Drone-Assisted Wildlife Monitoring.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

SPCS-IoTEH: Secure Privacy-Preserving Communication Scheme for IoT-Enabled e-Health Applications.
Proceedings of the ICC 2021, 2021

2020
On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment.
IEEE Trans. Veh. Technol., 2020

Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment.
IEEE Trans. Veh. Technol., 2020

2PBDC: privacy-preserving bigdata collection in cloud environment.
J. Supercomput., 2020

Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment.
IEEE Trans. Ind. Informatics, 2020

Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment.
IEEE Trans. Dependable Secur. Comput., 2020

Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2020

Cloud Centric Authentication for Wearable Healthcare Monitoring System.
IEEE Trans. Dependable Secur. Comput., 2020

Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment.
Sensors, 2020

A Smart Waste Management Solution Geared towards Citizens.
Sensors, 2020

An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments.
Sensors, 2020

On the design of biometric-based user authentication protocol in smart city environment.
Pattern Recognit. Lett., 2020

LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment.
J. Netw. Comput. Appl., 2020

Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment.
J. Inf. Secur. Appl., 2020

Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment.
IEEE Internet Things J., 2020

Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems.
Future Gener. Comput. Syst., 2020

Design of a blind quantization-based audio watermarking scheme using singular value decomposition.
Concurr. Comput. Pract. Exp., 2020

Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment.
Comput. Commun., 2020

A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT.
Comput. Networks, 2020

IoV-SMAP: Secure and Efficient Message Authentication Protocol for IoV in Smart City Environment.
IEEE Access, 2020

A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things.
IEEE Access, 2020

Design of Secure Authentication Protocol for Cloud-Assisted Telecare Medical Information System Using Blockchain.
IEEE Access, 2020

Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges.
IEEE Access, 2020

LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things.
IEEE Access, 2020

On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks.
IEEE Access, 2020

BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment.
IEEE Access, 2020

Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges.
IEEE Access, 2020

Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services.
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020

On the Design of Secure Communication Framework for Blockchain-Based Internet of Intelligent Battlefield Things Environment.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

On the Design of Blockchain-Based Access Control Scheme for Software Defined Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

On the Design of Blockchain-Based Access Control Protocol for IoT-Enabled Healthcare Applications.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

SAC-FIIoT: Secure Access Control Scheme for Fog-Based Industrial Internet of Things.
Proceedings of the IEEE Global Communications Conference, 2020

Cache Poisoning Prevention Scheme in 5G-enabled Vehicular Networks: A Tangle-based Theoretical Perspective.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment.
IEEE Trans. Veh. Technol., 2019

Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications.
IEEE Trans. Ind. Informatics, 2019

ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System.
IEEE Trans. Ind. Informatics, 2019

Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2019

LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
Sensors, 2019

User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions.
Pervasive Mob. Comput., 2019

Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment.
Mob. Networks Appl., 2019

Authentication in cloud-driven IoT-based big data environment: Survey and outlook.
J. Syst. Archit., 2019

A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment.
J. Ambient Intell. Humaniz. Comput., 2019

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications.
ISC Int. J. Inf. Secur., 2019

Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment.
IEEE Internet Things J., 2019

AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment.
IEEE Internet Things J., 2019

Certificate-Based Anonymous Device Access Control Scheme for IoT Environment.
IEEE Internet Things J., 2019

A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment.
IEEE Internet Things J., 2019

RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment.
Int. J. Commun. Syst., 2019

Design of secure key management and user authentication scheme for fog computing services.
Future Gener. Comput. Syst., 2019

Government regulations in cyber security: Framework, standards and recommendations.
Future Gener. Comput. Syst., 2019

Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions.
IEEE Consumer Electron. Mag., 2019

IoMT Malware Detection Approaches: Analysis and Research Challenges.
IEEE Access, 2019

A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things.
IEEE Access, 2019

A Mean Quantization Watermarking Scheme for Audio Signals Using Singular-Value Decomposition.
IEEE Access, 2019

Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment.
IEEE Access, 2019

Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions.
IEEE Access, 2019

Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019

On the Design of a Secure Anonymous User Authentication Scheme for Multiple Base Stations Based Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019

2018
Secure Message Communication Protocol Among Vehicles in Smart City.
IEEE Trans. Veh. Technol., 2018

Provably Secure Authenticated Key Agreement Scheme for Smart Grid.
IEEE Trans. Smart Grid, 2018

A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers.
J. Supercomput., 2018

Attribute-based authentication on the cloud for thin clients.
J. Supercomput., 2018

A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.
IEEE J. Biomed. Health Informatics, 2018

Providing Healthcare-as-a-Service Using Fuzzy Rule Based Big Data Analytics in Cloud Computing.
IEEE J. Biomed. Health Informatics, 2018

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
IEEE J. Biomed. Health Informatics, 2018

A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks.
Telecommun. Syst., 2018

Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment.
IEEE Trans. Dependable Secur. Comput., 2018

A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multim. Tools Appl., 2018

Authenticated key management protocol for cloud-assisted body area sensor networks.
J. Netw. Comput. Appl., 2018

A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications.
J. Ambient Intell. Humaniz. Comput., 2018

Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography.
J. Ambient Intell. Humaniz. Comput., 2018

Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks.
IEEE Internet Things J., 2018

Secure Healthcare Data Dissemination Using Vehicle Relay Networks.
IEEE Internet Things J., 2018

Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things.
IEEE Internet Things J., 2018

Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment.
IEEE Internet Things J., 2018

On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC.
Int. J. Commun. Syst., 2018

A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor.
Int. J. Ad Hoc Ubiquitous Comput., 2018

On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks.
IACR Cryptol. ePrint Arch., 2018

Taxonomy and analysis of security protocols for Internet of Things.
Future Gener. Comput. Syst., 2018

A new two-server authentication and key agreement protocol for accessing secure cloud services.
Comput. Networks, 2018

LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment.
IEEE Commun. Mag., 2018

SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment.
IEEE Commun. Mag., 2018

Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions.
IEEE Consumer Electron. Mag., 2018

Introduction to the special section on Big data and IoT in e-healthcare.
Comput. Electr. Eng., 2018

An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks.
Comput. Electr. Eng., 2018

2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment.
IEEE Access, 2018

HEAP: An Efficient and Fault-Tolerant Authentication and Key Exchange Protocol for Hadoop-Assisted Big Data Platform.
IEEE Access, 2018

Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment.
IEEE Access, 2018

Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks.
IEEE Access, 2018

LaCSys: Lattice-Based Cryptosystem for Secure Communication in Smart Grid Environment.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Demand Response Management Using Lattice-Based Cryptography in Smart Grids.
Proceedings of the IEEE Global Communications Conference, 2018

Mixed Unit Interval Bigraphs.
Proceedings of the Algorithms and Discrete Applied Mathematics, 2018

2017
A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks.
Wirel. Pers. Commun., 2017

A Multi-server Environment with Secure and Efficient Remote User Authentication Scheme Based on Dynamic ID Using Smart Cards.
Wirel. Pers. Commun., 2017

A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017

A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017

A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks.
Wirel. Pers. Commun., 2017

Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment.
IEEE Trans. Ind. Informatics, 2017

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Netw. Comput. Appl., 2017

Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment.
IEEE Internet Things J., 2017

Robust Anonymous Mutual Authentication Scheme for n-Times Ubiquitous Mobile Cloud Computing Services.
IEEE Internet Things J., 2017

A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor.
Int. J. Commun. Syst., 2017

Provably secure authenticated key agreement scheme for distributed mobile cloud computing services.
Future Gener. Comput. Syst., 2017

Design of a provably secure biometrics-based multi-cloud-server authentication scheme.
Future Gener. Comput. Syst., 2017

Graphs and digraphs represented by intervals and circular arcs.
Discret. Appl. Math., 2017

Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment.
Comput. Stand. Interfaces, 2017

On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2017

Lightweight authentication protocols for wearable devices.
Comput. Electr. Eng., 2017

An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks.
Ann. des Télécommunications, 2017

Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks.
IEEE Access, 2017

On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services.
IEEE Access, 2017

Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks.
IEEE Access, 2017

Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts.
IEEE Access, 2017

Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices.
IEEE Access, 2017

On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems.
IEEE Access, 2017

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications.
IEEE Access, 2017

Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment.
IEEE Access, 2017

2016
An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks.
Wirel. Pers. Commun., 2016

A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2016

A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
Wirel. Pers. Commun., 2016

SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms.
IEEE Trans. Consumer Electron., 2016

A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks.
Secur. Commun. Networks, 2016

Provably secure biometric-based user authentication and key agreement scheme in cloud computing.
Secur. Commun. Networks, 2016

Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS.
Secur. Commun. Networks, 2016

Design of sinkhole node detection mechanism for hierarchical wireless sensor networks.
Secur. Commun. Networks, 2016

Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography.
Secur. Commun. Networks, 2016

An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks.
Secur. Commun. Networks, 2016

A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks.
Secur. Commun. Networks, 2016

Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor.
Secur. Commun. Networks, 2016

Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks.
Secur. Commun. Networks, 2016

An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.
Secur. Commun. Networks, 2016

Provably secure user authentication and key agreement scheme for wireless sensor networks.
Secur. Commun. Networks, 2016

Provably secure three-factor authentication and key agreement scheme for session initiation protocol.
Secur. Commun. Networks, 2016

A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card.
Peer-to-Peer Netw. Appl., 2016

A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks.
Peer-to-Peer Netw. Appl., 2016

Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2016

Analysis of Security Protocols for Mobile Healthcare.
J. Medical Syst., 2016

A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system.
J. King Saud Univ. Comput. Inf. Sci., 2016

A User Anonymous Mutual Authentication Protocol.
KSII Trans. Internet Inf. Syst., 2016

An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards.
KSII Trans. Internet Inf. Syst., 2016

Design of a secure smart card-based multi-server authentication scheme.
J. Inf. Secur. Appl., 2016

A secure and efficient time-bound hierarchical access control scheme for secure broadcasting.
Int. J. Ad Hoc Ubiquitous Comput., 2016

Lightweight authentication with key-agreement protocol for mobile network environment using smart cards.
IET Inf. Secur., 2016

A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps.
Future Gener. Comput. Syst., 2016

Forbidden substructure for interval digraphs/bigraphs.
Discret. Math., 2016

Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.
Comput. Methods Programs Biomed., 2016

Secure anonymous mutual authentication for star two-tier wireless body area networks.
Comput. Methods Programs Biomed., 2016

An efficient fast algorithm for discovering closed+ high utility itemsets.
Appl. Intell., 2016

A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography.
IEEE Access, 2016

An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Forbidden Subgraphs of Bigraphs of Ferrers Dimension 2.
Proceedings of the Theoretical Computer Science and Discrete Mathematics, 2016

2015
A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks.
Wirel. Pers. Commun., 2015

An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems.
Wirel. Pers. Commun., 2015

DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks.
Wirel. Pers. Commun., 2015

A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks.
Wirel. Pers. Commun., 2015

A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards.
IEEE Trans. Inf. Forensics Secur., 2015

An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards.
Secur. Commun. Networks, 2015

A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks.
Secur. Commun. Networks, 2015

An anonymous and secure biometric-based enterprise digital rights management system for mobile environment.
Secur. Commun. Networks, 2015

An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks.
Secur. Commun. Networks, 2015

An effective association rule mining scheme using a new generic basis.
Knowl. Inf. Syst., 2015

A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.
J. Medical Syst., 2015

A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems.
J. Medical Syst., 2015

A Secure and Robust Password-Based Remote User Authentication Scheme Using Smart Cards for the Integrated EPR Information System.
J. Medical Syst., 2015

A robust anonymous biometric-based remote user authentication scheme using smart cards.
J. King Saud Univ. Comput. Inf. Sci., 2015

An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card.
J. Inf. Secur. Appl., 2015

A secure password-based authentication and key agreement scheme using smart cards.
J. Inf. Secur. Appl., 2015

An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks.
Int. J. Commun. Networks Distributed Syst., 2015

A secure and effective access control scheme for distributed wireless sensor networks.
Int. J. Commun. Networks Distributed Syst., 2015

An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices.
IACR Cryptol. ePrint Arch., 2015

An efficient approach for mining association rules from high utility itemsets.
Expert Syst. Appl., 2015

New characterizations of proper interval bigraphs.
AKCE Int. J. Graphs Comb., 2015

A New Biometric-Based Remote User Authentication Scheme in Hierarchical Wireless Body Area Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2015

New Characterizations of Proper Interval Bigraphs and Proper Circular Arc Bigraphs.
Proceedings of the Algorithms and Discrete Applied Mathematics, 2015

2014
An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function.
J. Medical Syst., 2014

A novel and efficient user access control scheme for wireless body area sensor networks.
J. King Saud Univ. Comput. Inf. Sci., 2014

A secure effective key management scheme for dynamic access control in a large leaf class hierarchy.
Inf. Sci., 2014

Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks.
Int. J. Trust. Manag. Comput. Commun., 2014

A survey on user access control in wireless sensor networks with formal security verification.
Int. J. Trust. Manag. Comput. Commun., 2014

An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function.
Int. J. Commun. Networks Distributed Syst., 2014

Cryptanalysis on 'Robust Biometrics-Based Authentication Scheme for Multi-server Environment'.
IACR Cryptol. ePrint Arch., 2014

On the Security of 'An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'.
IACR Cryptol. ePrint Arch., 2014

A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards.
Expert Syst. Appl., 2014

An Algorithm for Mining High Utility Closed Itemsets and Generators.
CoRR, 2014

An Enhanced Access Control Scheme in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2014

Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications, 2014

Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications, 2014

2013
A New Key Management Scheme for a User Hierarchy based on a Hybrid Cryptosystem.
Smart Comput. Rev., 2013

An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System.
J. Medical Syst., 2013

A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care.
J. Medical Syst., 2013

An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System.
J. Medical Syst., 2013

A novel proxy signature scheme based on user hierarchical access control policy.
J. King Saud Univ. Comput. Inf. Sci., 2013

A novel linear polynomial-based dynamic key management scheme for hierarchical access control.
Int. J. Trust. Manag. Comput. Commun., 2013

A Novel Efficient Access Control Scheme for Large-Scale Distributed Wireless Sensor Networks.
Int. J. Found. Comput. Sci., 2013

Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

LHSC: An effective dynamic key management scheme for linear hierarchical access control.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks.
J. Netw. Comput. Appl., 2012

Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem.
Inf. Sci., 2012

Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks.
Int. J. Netw. Secur., 2012

A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks.
Int. J. Inf. Sec., 2012

A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

2011
An efficient random key distribution scheme for large-scale distributed sensor networks.
Secur. Commun. Networks, 2011

An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks.
J. Comput., 2011

Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards.
IET Inf. Secur., 2011

A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge
CoRR, 2011

An Unconditionally Secure Key Management Scheme for Large-Scale Heterogeneous Wireless Sensor Networks
CoRR, 2011

An Identity Based Key Management Scheme in Wireless Sensor Networks
CoRR, 2011

An Improved Efficient Key Distribution Mechanism for Large-Scale Heterogeneous Mobile Sensor Networks
CoRR, 2011

Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards
CoRR, 2011

2009
A Location-Adaptive Key Establishment Scheme for Large-Scale Distributed Wireless Sensor Networks.
J. Comput., 2009

2008
ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks.
Int. J. Netw. Secur., 2008

An Identity-ased Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks.
Int. J. Netw. Secur., 2008

An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

2007
A Key Establishment Scheme for Large-Scale Mobile Wireless Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2007

2006
A bidirectional linear semi-systolic architecture for DCT-domain image resizing processor.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

2005
Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks.
Proceedings of the Distributed Computing, 2005

A Key Reshuffling Scheme for Wireless Sensor Networks.
Proceedings of the Information Systems Security, First International Conference, 2005


  Loading...