All Stories

  1. PSL-IoD: PUF-Based Secure Last-Mile Drone Delivery in Supply Chain Management
  2. AI-driven predictive modeling for disease prevention and early detection
  3. FA-SMW: Fog-Driven Anonymous Lightweight Access Control for Smart Medical Wearables
  4. PBatch: Pseudonym Certificate Batch Authentication With Generative AI-Based Cache for Cooperative Intelligent Transportation Systems
  5. SDN-Assisted Spatial Encoded Sequence Enabled BLSTM-Based Zero-Trust Anomaly Detection Model for Consumer Electronics of Smart Cities
  6. TS-PAID: A Two-Stage PUF-Based Lightweight Authentication Protocol for Internet of Drones
  7. BSP-IoD: A Secure Drone-enabled Authentication Protocol using Barrel-Shifter PUF
  8. SAC-DeV: Secure Access Control for Drone-Assisted edge computing in e-VANETs
  9. GUEST EDITORIAL Enhancing Edge-based consumer electronics devices and IoT Ecosystem with Post Quantum Cryptosystem: Security Challenges and Solutions”
  10. PDCM-IoD: A lightweight PUF-based Drone Access Control Mechanism for Internet of Drones
  11. Secure and Reliable Authentication Protocol for Energy Internet-Enabled Vehicle-to-Grid Communication System
  12. Correction to: ReSOTS: RFID/IoT-Enabled Secure Object Tracking Key Exchange for Trustworthy Smart Logistics
  13. ReSOTS: RFID/IoT-Enabled Secure Object Tracking Key Exchange for Trustworthy Smart Logistics
  14. SAWPS: Secure Access Control for Wearable Plant Sensors—Reinforcing Agriculture 4.0
  15. SPAKE-DC: A Secure PUF Enabled Authenticated Key Exchange for 5G-Based Drone Communications
  16. DAC‐MD: A privacy preserving drone‐access control scheme for last mile delivery
  17. A Novel Self-Calibrated UWB-Based Indoor Localization Systems for Context-Aware Applications
  18. Modeling Topic-Specific Influential Users in QA Forums Using Association Rule Mining
  19. SEMS-5G: A Secure and Efficient Multi-Server Authentication Scheme for 5G Networks
  20. MCLA Task Offloading Framework for 5G-NR-V2X-Based Heterogeneous VECNs
  21. SUSIC: A Secure User Access Control Mechanism for SDN-Enabled IIoT and Cyber–Physical Systems
  22. Energy efficient indoor localisation for narrowband internet of things
  23. Identification and Visualization of Spatial and Temporal Trends in Textile Industry
  24. BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment
  25. ReSOTS: RFID/IoT-enabled Secure Object Tracking Key Exchange for Trustworthy Smart Logistics
  26. An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics
  27. Architecture, Protocols, and Security in IoV: Taxonomy, Analysis, Challenges, and Solutions
  28. Review: a comparative study of state-of-the-art skin image segmentation techniques with CNN
  29. An Automated Approach for the Prediction of the Severity Level of Bug Reports Using GPT-2
  30. Security Hardened and Privacy Preserved Vehicle-to-Everything (V2X) Communication
  31. A resource friendly authentication scheme for space–air–ground–sea integrated Maritime Communication Network
  32. A low-cost privacy preserving user access in mobile edge computing framework
  33. Assessing Land Cover Transformation for Urban Environmental Sustainability through Satellite Sensing
  34. Practitioner’s view of the success factors for software outsourcing partnership formation: an empirical exploration
  35. The Trajectories, Trends, and Opportunities for Assessing Urban Ecosystem Services: A Systematic Review of Geospatial Methods
  36. Industrial Automation Information Analogy for Smart Grid Security
  37. Empirical Analysis of Machine Learning Algorithms for Multiclass Prediction
  38. SKIA‐SH: A Symmetric Key‐Based Improved Lightweight Authentication Scheme for Smart Homes
  39. A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System
  40. Quality Prediction of Wearable Apps in the Google Play Store
  41. Spark Spectrum Allocation for D2D Communication in Cellular Networks
  42. Classification and Prediction of Software Incidents Using Machine Learning Techniques
  43. Software Defined Network Enabled Fog-to-Things Hybrid Deep Learning Driven Cyber Threat Detection System
  44. A secure demand response management authentication scheme for smart grid
  45. A Physical Capture Resistant Authentication Scheme for the Internet of Drones
  46. An anonymous device to device access control based on secure certificate for internet of medical things systems
  47. Adaptive Fault-Tolerant System and Optimal Power Allocation for Smart Vehicles in Smart Cities Using Controller Area Network
  48. A Novel Pairing-Free Lightweight Authentication Protocol for Mobile Cloud Computing Framework
  49. Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server
  50. A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment
  51. Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment
  52. Comment on ‘ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications’
  53. A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System
  54. Smart workload migration on external cloud service providers to minimize delay, running time, and transfer cost
  55. Further comments on ‘SFVCC: Chaotic map‐based security framework for vehicular cloud computing’
  56. Comment on ‘SFVCC: Chaotic map‐based security framework for vehicular cloud computing’
  57. A secure and efficient remote patient-monitoring authentication protocol for cloud-IoT
  58. A Provably Secure and Lightweight Patient-Healthcare Authentication Protocol in Wireless Body Area Networks
  59. An Improved SIP Authenticated Key Agreement Based on Dongqing et al.
  60. A provably secure and efficient authenticated key agreement scheme for Energy Internet based Vehicle-to-Grid technology framework
  61. An Improved Lightweight Authentication Protocol for Wireless Body Area Networks
  62. An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol
  63. A provable and secure mobile user authentication scheme for mobile cloud computing services
  64. Performance analysis of secure communications over correlated slow-fading additive white Gaussian noise channels
  65. Ranked Sense Multiple Access Control Protocol for Multichannel Cognitive Radio-Based IoT Networks
  66. An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre
  67. Handshake Sense Multiple Access Control for Cognitive Radio-Based IoT Networks
  68. Self-Citation Analysis on Google Scholar Dataset for H-Index Corrections
  69. An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment
  70. Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee’s Scheme
  71. A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.’s Scheme
  72. Adaptive and Economically-Robust Group Selling of Spectrum Slots for Cognitive Radio-Based Networks
  73. An efficient and secure design of multi-server authenticated key agreement protocol
  74. Multiple Access Control for Cognitive Radio-Based IEEE 802.11ah Networks
  75. Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
  76. A secure mutual authenticated key agreement of user with multiple servers for critical systems
  77. An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture
  78. An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification
  79. An improved lightweight multiserver authentication scheme
  80. An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo’s Scheme
  81. An improved and secure chaotic map based authenticated key agreement in multi-server architecture
  82. An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture
  83. An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services
  84. A provably secure anonymous authentication scheme for Session Initiation Protocol
  85. A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme
  86. Comments on “A privacy preserving three-factor authentication protocol for e-health clouds”
  87. Spread Spectrum Based Energy Efficient Collaborative Communication in Wireless Sensor Networks
  88. An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre
  89. Flexible and efficient aggregation framework for antifragile wireless mesh networks
  90. An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
  91. Skill Specific Spoken Dialogues Based Personalized ATM Design to Maximize Effective Interaction for Visually Impaired Persona
  92. A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
  93. A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
  94. An Algorithm for Prediction of Overhead Messages in Client-Server Based Wireless Networks
  95. Hash-chain based peer-peer key management and establishment of security associations in MANETS
  96. Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers
  97. Performance Evaluation of Authentication Certificate Based Seamless Vertical Handoff in GPRS-WLAN
  98. Performance Evaluation Analysis of Group Mobility in Mobile Ad Hoc Networks
  99. A secure interaction among nodes from different MANET groups using 4G technologies
  100. Authentication of Nodes among Different Symmetric Key Groups in MANETs Using 4G Technologies
  101. Certificate chain based authentication in MANETS using 4th generation technologies
  102. Seamless vertical handoff using Authentication Certificate in GPRS-WLAN tightly coupled integrated networks