All Stories

  1. PSL-IoD: PUF-Based Secure Last-Mile Drone Delivery in Supply Chain Management
  2. AI-driven predictive modeling for disease prevention and early detection
  3. FA-SMW: Fog-Driven Anonymous Lightweight Access Control for Smart Medical Wearables
  4. PBatch: Pseudonym Certificate Batch Authentication With Generative AI-Based Cache for Cooperative Intelligent Transportation Systems
  5. SDN-Assisted Spatial Encoded Sequence Enabled BLSTM-Based Zero-Trust Anomaly Detection Model for Consumer Electronics of Smart Cities
  6. TS-PAID: A Two-Stage PUF-Based Lightweight Authentication Protocol for Internet of Drones
  7. BSP-IoD: A Secure Drone-enabled Authentication Protocol using Barrel-Shifter PUF
  8. SAC-DeV: Secure Access Control for Drone-Assisted edge computing in e-VANETs
  9. GUEST EDITORIAL Enhancing Edge-based consumer electronics devices and IoT Ecosystem with Post Quantum Cryptosystem: Security Challenges and Solutions”
  10. PDCM-IoD: A lightweight PUF-based Drone Access Control Mechanism for Internet of Drones
  11. Correction to: ReSOTS: RFID/IoT-Enabled Secure Object Tracking Key Exchange for Trustworthy Smart Logistics
  12. ReSOTS: RFID/IoT-Enabled Secure Object Tracking Key Exchange for Trustworthy Smart Logistics
  13. SAWPS: Secure Access Control for Wearable Plant Sensors—Reinforcing Agriculture 4.0
  14. SPAKE-DC: A Secure PUF Enabled Authenticated Key Exchange for 5G-Based Drone Communications
  15. DAC‐MD: A privacy preserving drone‐access control scheme for last mile delivery
  16. A Novel Self-Calibrated UWB-Based Indoor Localization Systems for Context-Aware Applications
  17. Modeling Topic-Specific Influential Users in QA Forums Using Association Rule Mining
  18. SEMS-5G: A Secure and Efficient Multi-Server Authentication Scheme for 5G Networks
  19. MCLA Task Offloading Framework for 5G-NR-V2X-Based Heterogeneous VECNs
  20. SUSIC: A Secure User Access Control Mechanism for SDN-Enabled IIoT and Cyber–Physical Systems
  21. Energy efficient indoor localisation for narrowband internet of things
  22. Identification and Visualization of Spatial and Temporal Trends in Textile Industry
  23. BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment
  24. ReSOTS: RFID/IoT-enabled Secure Object Tracking Key Exchange for Trustworthy Smart Logistics
  25. An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics
  26. Architecture, Protocols, and Security in IoV: Taxonomy, Analysis, Challenges, and Solutions
  27. Review: a comparative study of state-of-the-art skin image segmentation techniques with CNN
  28. An Automated Approach for the Prediction of the Severity Level of Bug Reports Using GPT-2
  29. Security Hardened and Privacy Preserved Vehicle-to-Everything (V2X) Communication
  30. A resource friendly authentication scheme for space–air–ground–sea integrated Maritime Communication Network
  31. A low-cost privacy preserving user access in mobile edge computing framework
  32. Assessing Land Cover Transformation for Urban Environmental Sustainability through Satellite Sensing
  33. Practitioner’s view of the success factors for software outsourcing partnership formation: an empirical exploration
  34. The Trajectories, Trends, and Opportunities for Assessing Urban Ecosystem Services: A Systematic Review of Geospatial Methods
  35. Industrial Automation Information Analogy for Smart Grid Security
  36. Empirical Analysis of Machine Learning Algorithms for Multiclass Prediction
  37. SKIA‐SH: A Symmetric Key‐Based Improved Lightweight Authentication Scheme for Smart Homes
  38. A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System
  39. Quality Prediction of Wearable Apps in the Google Play Store
  40. Spark Spectrum Allocation for D2D Communication in Cellular Networks
  41. Classification and Prediction of Software Incidents Using Machine Learning Techniques
  42. Software Defined Network Enabled Fog-to-Things Hybrid Deep Learning Driven Cyber Threat Detection System
  43. A secure demand response management authentication scheme for smart grid
  44. A Physical Capture Resistant Authentication Scheme for the Internet of Drones
  45. An anonymous device to device access control based on secure certificate for internet of medical things systems
  46. Adaptive Fault-Tolerant System and Optimal Power Allocation for Smart Vehicles in Smart Cities Using Controller Area Network
  47. A Novel Pairing-Free Lightweight Authentication Protocol for Mobile Cloud Computing Framework
  48. Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server
  49. A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment
  50. Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment
  51. Comment on ‘ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications’
  52. A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System
  53. Smart workload migration on external cloud service providers to minimize delay, running time, and transfer cost
  54. Further comments on ‘SFVCC: Chaotic map‐based security framework for vehicular cloud computing’
  55. Comment on ‘SFVCC: Chaotic map‐based security framework for vehicular cloud computing’
  56. A secure and efficient remote patient-monitoring authentication protocol for cloud-IoT
  57. A Provably Secure and Lightweight Patient-Healthcare Authentication Protocol in Wireless Body Area Networks
  58. An Improved SIP Authenticated Key Agreement Based on Dongqing et al.
  59. A provably secure and efficient authenticated key agreement scheme for Energy Internet based Vehicle-to-Grid technology framework
  60. An Improved Lightweight Authentication Protocol for Wireless Body Area Networks
  61. An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol
  62. A provable and secure mobile user authentication scheme for mobile cloud computing services
  63. Performance analysis of secure communications over correlated slow-fading additive white Gaussian noise channels
  64. Ranked Sense Multiple Access Control Protocol for Multichannel Cognitive Radio-Based IoT Networks
  65. An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre
  66. Handshake Sense Multiple Access Control for Cognitive Radio-Based IoT Networks
  67. Self-Citation Analysis on Google Scholar Dataset for H-Index Corrections
  68. An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment
  69. Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee’s Scheme
  70. A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.’s Scheme
  71. Adaptive and Economically-Robust Group Selling of Spectrum Slots for Cognitive Radio-Based Networks
  72. An efficient and secure design of multi-server authenticated key agreement protocol
  73. Multiple Access Control for Cognitive Radio-Based IEEE 802.11ah Networks
  74. Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
  75. A secure mutual authenticated key agreement of user with multiple servers for critical systems
  76. An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture
  77. An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification
  78. An improved lightweight multiserver authentication scheme
  79. An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo’s Scheme
  80. An improved and secure chaotic map based authenticated key agreement in multi-server architecture
  81. An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture
  82. An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services
  83. A provably secure anonymous authentication scheme for Session Initiation Protocol
  84. A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme
  85. Comments on “A privacy preserving three-factor authentication protocol for e-health clouds”
  86. Spread Spectrum Based Energy Efficient Collaborative Communication in Wireless Sensor Networks
  87. An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre
  88. Flexible and efficient aggregation framework for antifragile wireless mesh networks
  89. An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
  90. Skill Specific Spoken Dialogues Based Personalized ATM Design to Maximize Effective Interaction for Visually Impaired Persona
  91. A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
  92. A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
  93. An Algorithm for Prediction of Overhead Messages in Client-Server Based Wireless Networks
  94. Hash-chain based peer-peer key management and establishment of security associations in MANETS
  95. Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers
  96. Performance Evaluation of Authentication Certificate Based Seamless Vertical Handoff in GPRS-WLAN
  97. Performance Evaluation Analysis of Group Mobility in Mobile Ad Hoc Networks
  98. A secure interaction among nodes from different MANET groups using 4G technologies
  99. Authentication of Nodes among Different Symmetric Key Groups in MANETs Using 4G Technologies
  100. Certificate chain based authentication in MANETS using 4th generation technologies
  101. Seamless vertical handoff using Authentication Certificate in GPRS-WLAN tightly coupled integrated networks