All Stories

  1. Quantum Safe Lattice-Based Single Round Online Collaborative Multi-Signature Scheme for Blockchain-Enabled IoT Applications
  2. Privacy-Preserving Blockchain-Based Authentication in Smart Energy Systems
  3. BAKP-IoDA
  4. Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services
  5. On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC
  6. Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks
  7. Provably secure three-factor authentication and key agreement scheme for session initiation protocol
  8. Design of sinkhole node detection mechanism for hierarchical wireless sensor networks
  9. Provably secure biometric-based user authentication and key agreement scheme in cloud computing
  10. Provably secure user authentication and key agreement scheme for wireless sensor networks
  11. Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography
  12. A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks
  13. A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
  14. Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor
  15. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
  16. Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS
  17. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards
  18. An efficient approach for mining association rules from high utility itemsets
  19. An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems
  20. An anonymous and secure biometric-based enterprise digital rights management system for mobile environment
  21. DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks
  22. An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card
  23. A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems
  24. A Secure and Robust Password-Based Remote User Authentication Scheme Using Smart Cards for the Integrated EPR Information System
  25. A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
  26. A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks
  27. A secure and effective access control scheme for distributed wireless sensor networks
  28. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
  29. A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
  30. A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards
  31. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks
  32. An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks
  33. An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function
  34. A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
  35. An effective association rule mining scheme using a new generic basis
  36. Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks
  37. An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function
  38. A survey on user access control in wireless sensor networks with formal security verification
  39. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
  40. Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks
  41. Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks
  42. An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System
  43. A NOVEL EFFICIENT ACCESS CONTROL SCHEME FOR LARGE-SCALE DISTRIBUTED WIRELESS SENSOR NETWORKS
  44. A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
  45. An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System
  46. A novel linear polynomial-based dynamic key management scheme for hierarchical access control
  47. LHSC: An effective dynamic key management scheme for linear hierarchical access control
  48. Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function
  49. Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks
  50. Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
  51. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
  52. A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications
  53. A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks
  54. A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials
  55. An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks
  56. A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge
  57. Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards
  58. A Secure Proxy Blind Signature Scheme Based on DLP
  59. A Location-Adaptive Key Establishment Scheme for Large-Scale Distributed Wireless Sensor Networks
  60. An efficient random key distribution scheme for large-scale distributed sensor networks
  61. An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks
  62. An unconditionally secure location-aware key management scheme for static sensor networks
  63. An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials
  64. A Key Reshuffling Scheme for Wireless Sensor Networks
  65. Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks
  66. A Key Establishment Scheme for Large-Scale Mobile Wireless Sensor Networks