All Stories

  1. Privacy-Preserving Blockchain-Based Authentication in Smart Energy Systems
  2. BAKP-IoDA
  3. Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services
  4. On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC
  5. Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks
  6. Provably secure three-factor authentication and key agreement scheme for session initiation protocol
  7. Design of sinkhole node detection mechanism for hierarchical wireless sensor networks
  8. Provably secure biometric-based user authentication and key agreement scheme in cloud computing
  9. Provably secure user authentication and key agreement scheme for wireless sensor networks
  10. Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography
  11. A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks
  12. A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
  13. Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor
  14. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
  15. Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS
  16. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards
  17. An efficient approach for mining association rules from high utility itemsets
  18. An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems
  19. An anonymous and secure biometric-based enterprise digital rights management system for mobile environment
  20. DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks
  21. An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card
  22. A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems
  23. A Secure and Robust Password-Based Remote User Authentication Scheme Using Smart Cards for the Integrated EPR Information System
  24. A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
  25. A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks
  26. A secure and effective access control scheme for distributed wireless sensor networks
  27. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
  28. A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
  29. A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards
  30. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks
  31. An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks
  32. An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function
  33. A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
  34. An effective association rule mining scheme using a new generic basis
  35. Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks
  36. An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function
  37. A survey on user access control in wireless sensor networks with formal security verification
  38. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
  39. Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks
  40. Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks
  41. An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System
  42. A NOVEL EFFICIENT ACCESS CONTROL SCHEME FOR LARGE-SCALE DISTRIBUTED WIRELESS SENSOR NETWORKS
  43. A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
  44. An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System
  45. A novel linear polynomial-based dynamic key management scheme for hierarchical access control
  46. LHSC: An effective dynamic key management scheme for linear hierarchical access control
  47. Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function
  48. Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks
  49. Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
  50. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
  51. A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications
  52. A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks
  53. A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials
  54. An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks
  55. A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge
  56. Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards
  57. A Secure Proxy Blind Signature Scheme Based on DLP
  58. A Location-Adaptive Key Establishment Scheme for Large-Scale Distributed Wireless Sensor Networks
  59. An efficient random key distribution scheme for large-scale distributed sensor networks
  60. An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks
  61. An unconditionally secure location-aware key management scheme for static sensor networks
  62. An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials
  63. A Key Reshuffling Scheme for Wireless Sensor Networks
  64. Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks
  65. A Key Establishment Scheme for Large-Scale Mobile Wireless Sensor Networks