Emmanuel Ahene

Orcid: 0000-0002-0810-1055

According to our database1, Emmanuel Ahene authored at least 16 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Guest editorial: Special issue on frontiers in cyber security.
J. Syst. Archit., December, 2023

2022
Heterogeneous signcryption with proxy re-encryption and its application in EHR systems.
Telecommun. Syst., 2022

Cold Boot Attack on Encrypted Containers for Forensic Investigations.
KSII Trans. Internet Inf. Syst., 2022

Efficient deniable authentication and its application in location-based services.
Comput. Electr. Eng., 2022

Corrections to "Evaluation of Conversational Agents: Understanding Culture, Context and Environment in Emotion Detection".
IEEE Access, 2022

Evaluation of Conversational Agents: Understanding Culture, Context and Environment in Emotion Detection.
IEEE Access, 2022

Rainfall Prediction Using Machine Learning Algorithms for the Various Ecological Zones of Ghana.
IEEE Access, 2022

Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

2021
Efficient Authentication Protocol and Its Application in Resonant Inductive Coupling Wireless Power Transfer Systems.
Sensors, 2021

2019
Certificateless deniably authenticated encryption and its application to e-voting system.
Telecommun. Syst., 2019

A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid.
Telecommun. Syst., 2019

A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs.
J. Syst. Archit., 2019

Efficient Signcryption With Proxy Re-Encryption and its Application in Smart Grid.
IEEE Internet Things J., 2019

CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

2016
A Multi-objective Optimization Approach to Workflow Scheduling in Clouds Considering Fault Recovery.
KSII Trans. Internet Inf. Syst., 2016

2015
A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security.
KSII Trans. Internet Inf. Syst., 2015


  Loading...