All Stories

  1. A secure and efficient remote patient-monitoring authentication protocol for cloud-IoT
  2. An Improved SIP Authenticated Key Agreement Based on Dongqing et al.
  3. A provable and secure mobile user authentication scheme for mobile cloud computing services
  4. Performance analysis of secure communications over correlated slow-fading additive white Gaussian noise channels
  5. Ranked Sense Multiple Access Control Protocol for Multichannel Cognitive Radio-Based IoT Networks
  6. An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre
  7. Handshake Sense Multiple Access Control for Cognitive Radio-Based IoT Networks
  8. An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment
  9. Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee’s Scheme
  10. A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.’s Scheme
  11. Adaptive and Economically-Robust Group Selling of Spectrum Slots for Cognitive Radio-Based Networks
  12. An efficient and secure design of multi-server authenticated key agreement protocol
  13. Multiple Access Control for Cognitive Radio-Based IEEE 802.11ah Networks
  14. A secure mutual authenticated key agreement of user with multiple servers for critical systems
  15. An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture
  16. An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification
  17. An improved lightweight multiserver authentication scheme
  18. An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo’s Scheme
  19. An improved and secure chaotic map based authenticated key agreement in multi-server architecture
  20. A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme
  21. Comments on “A privacy preserving three-factor authentication protocol for e-health clouds”
  22. Spread Spectrum Based Energy Efficient Collaborative Communication in Wireless Sensor Networks
  23. An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre
  24. Flexible and efficient aggregation framework for antifragile wireless mesh networks
  25. An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
  26. Skill Specific Spoken Dialogues Based Personalized ATM Design to Maximize Effective Interaction for Visually Impaired Persona
  27. A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
  28. A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
  29. An Algorithm for Prediction of Overhead Messages in Client-Server Based Wireless Networks
  30. Hash-chain based peer-peer key management and establishment of security associations in MANETS
  31. Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers
  32. Performance Evaluation of Authentication Certificate Based Seamless Vertical Handoff in GPRS-WLAN
  33. Performance Evaluation Analysis of Group Mobility in Mobile Ad Hoc Networks
  34. A secure interaction among nodes from different MANET groups using 4G technologies
  35. Authentication of Nodes among Different Symmetric Key Groups in MANETs Using 4G Technologies
  36. Certificate chain based authentication in MANETS using 4th generation technologies
  37. Seamless vertical handoff using Authentication Certificate in GPRS-WLAN tightly coupled integrated networks