All Stories

  1. Quantum Federated Learning for DoS Attack Detection and Privacy Preserving of VANET : A Novel Hybrid Machine Learning Approach
  2. SeBAC-IoD: A Secure and Efficient Batch Access Control Technique for Internet of Drones
  3. PSL-IoD: PUF-Based Secure Last-Mile Drone Delivery in Supply Chain Management
  4. AI-driven predictive modeling for disease prevention and early detection
  5. FA-SMW: Fog-Driven Anonymous Lightweight Access Control for Smart Medical Wearables
  6. PBatch: Pseudonym Certificate Batch Authentication With Generative AI-Based Cache for Cooperative Intelligent Transportation Systems
  7. SDN-Assisted Spatial Encoded Sequence Enabled BLSTM-Based Zero-Trust Anomaly Detection Model for Consumer Electronics of Smart Cities
  8. TS-PAID: A Two-Stage PUF-Based Lightweight Authentication Protocol for Internet of Drones
  9. BSP-IoD: A Secure Drone-enabled Authentication Protocol using Barrel-Shifter PUF
  10. SAC-DeV: Secure Access Control for Drone-Assisted edge computing in e-VANETs
  11. GUEST EDITORIAL Enhancing Edge-based consumer electronics devices and IoT Ecosystem with Post Quantum Cryptosystem: Security Challenges and Solutions”
  12. PDCM-IoD: A lightweight PUF-based Drone Access Control Mechanism for Internet of Drones
  13. Secure and Reliable Authentication Protocol for Energy Internet-Enabled Vehicle-to-Grid Communication System
  14. Correction to: ReSOTS: RFID/IoT-Enabled Secure Object Tracking Key Exchange for Trustworthy Smart Logistics
  15. ReSOTS: RFID/IoT-Enabled Secure Object Tracking Key Exchange for Trustworthy Smart Logistics
  16. SAWPS: Secure Access Control for Wearable Plant Sensors—Reinforcing Agriculture 4.0
  17. SPAKE-DC: A Secure PUF Enabled Authenticated Key Exchange for 5G-Based Drone Communications
  18. DAC‐MD: A privacy preserving drone‐access control scheme for last mile delivery
  19. A Novel Self-Calibrated UWB-Based Indoor Localization Systems for Context-Aware Applications
  20. Modeling Topic-Specific Influential Users in QA Forums Using Association Rule Mining
  21. SEMS-5G: A Secure and Efficient Multi-Server Authentication Scheme for 5G Networks
  22. MCLA Task Offloading Framework for 5G-NR-V2X-Based Heterogeneous VECNs
  23. SUSIC: A Secure User Access Control Mechanism for SDN-Enabled IIoT and Cyber–Physical Systems
  24. Energy efficient indoor localisation for narrowband internet of things
  25. Identification and Visualization of Spatial and Temporal Trends in Textile Industry
  26. BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment
  27. ReSOTS: RFID/IoT-enabled Secure Object Tracking Key Exchange for Trustworthy Smart Logistics
  28. An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics
  29. Architecture, Protocols, and Security in IoV: Taxonomy, Analysis, Challenges, and Solutions
  30. Review: a comparative study of state-of-the-art skin image segmentation techniques with CNN
  31. An Automated Approach for the Prediction of the Severity Level of Bug Reports Using GPT-2
  32. Security Hardened and Privacy Preserved Vehicle-to-Everything (V2X) Communication
  33. A resource friendly authentication scheme for space–air–ground–sea integrated Maritime Communication Network
  34. A low-cost privacy preserving user access in mobile edge computing framework
  35. Assessing Land Cover Transformation for Urban Environmental Sustainability through Satellite Sensing
  36. Practitioner’s view of the success factors for software outsourcing partnership formation: an empirical exploration
  37. The Trajectories, Trends, and Opportunities for Assessing Urban Ecosystem Services: A Systematic Review of Geospatial Methods
  38. Industrial Automation Information Analogy for Smart Grid Security
  39. Empirical Analysis of Machine Learning Algorithms for Multiclass Prediction
  40. SKIA‐SH: A Symmetric Key‐Based Improved Lightweight Authentication Scheme for Smart Homes
  41. A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System
  42. Quality Prediction of Wearable Apps in the Google Play Store
  43. Spark Spectrum Allocation for D2D Communication in Cellular Networks
  44. Classification and Prediction of Software Incidents Using Machine Learning Techniques
  45. Software Defined Network Enabled Fog-to-Things Hybrid Deep Learning Driven Cyber Threat Detection System
  46. A secure demand response management authentication scheme for smart grid
  47. A Physical Capture Resistant Authentication Scheme for the Internet of Drones
  48. An anonymous device to device access control based on secure certificate for internet of medical things systems
  49. Adaptive Fault-Tolerant System and Optimal Power Allocation for Smart Vehicles in Smart Cities Using Controller Area Network
  50. A Novel Pairing-Free Lightweight Authentication Protocol for Mobile Cloud Computing Framework
  51. Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server
  52. A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment
  53. Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment
  54. Comment on ‘ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications’
  55. A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System
  56. Smart workload migration on external cloud service providers to minimize delay, running time, and transfer cost
  57. Further comments on ‘SFVCC: Chaotic map‐based security framework for vehicular cloud computing’
  58. Comment on ‘SFVCC: Chaotic map‐based security framework for vehicular cloud computing’
  59. A secure and efficient remote patient-monitoring authentication protocol for cloud-IoT
  60. A Provably Secure and Lightweight Patient-Healthcare Authentication Protocol in Wireless Body Area Networks
  61. An Improved SIP Authenticated Key Agreement Based on Dongqing et al.
  62. A provably secure and efficient authenticated key agreement scheme for Energy Internet based Vehicle-to-Grid technology framework
  63. An Improved Lightweight Authentication Protocol for Wireless Body Area Networks
  64. An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol
  65. A provable and secure mobile user authentication scheme for mobile cloud computing services
  66. Performance analysis of secure communications over correlated slow-fading additive white Gaussian noise channels
  67. Ranked Sense Multiple Access Control Protocol for Multichannel Cognitive Radio-Based IoT Networks
  68. An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre
  69. Handshake Sense Multiple Access Control for Cognitive Radio-Based IoT Networks
  70. Self-Citation Analysis on Google Scholar Dataset for H-Index Corrections
  71. An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment
  72. Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee’s Scheme
  73. A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.’s Scheme
  74. Adaptive and Economically-Robust Group Selling of Spectrum Slots for Cognitive Radio-Based Networks
  75. An efficient and secure design of multi-server authenticated key agreement protocol
  76. Multiple Access Control for Cognitive Radio-Based IEEE 802.11ah Networks
  77. Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
  78. A secure mutual authenticated key agreement of user with multiple servers for critical systems
  79. An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture
  80. An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification
  81. An improved lightweight multiserver authentication scheme
  82. An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo’s Scheme
  83. An improved and secure chaotic map based authenticated key agreement in multi-server architecture
  84. An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture
  85. An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services
  86. A provably secure anonymous authentication scheme for Session Initiation Protocol
  87. A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme
  88. Comments on “A privacy preserving three-factor authentication protocol for e-health clouds”
  89. Spread Spectrum Based Energy Efficient Collaborative Communication in Wireless Sensor Networks
  90. An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre
  91. Flexible and efficient aggregation framework for antifragile wireless mesh networks
  92. An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
  93. Skill Specific Spoken Dialogues Based Personalized ATM Design to Maximize Effective Interaction for Visually Impaired Persona
  94. A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
  95. A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
  96. An Algorithm for Prediction of Overhead Messages in Client-Server Based Wireless Networks
  97. Hash-chain based peer-peer key management and establishment of security associations in MANETS
  98. Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers
  99. Performance Evaluation of Authentication Certificate Based Seamless Vertical Handoff in GPRS-WLAN
  100. Performance Evaluation Analysis of Group Mobility in Mobile Ad Hoc Networks
  101. A secure interaction among nodes from different MANET groups using 4G technologies
  102. Authentication of Nodes among Different Symmetric Key Groups in MANETs Using 4G Technologies
  103. Certificate chain based authentication in MANETS using 4th generation technologies
  104. Seamless vertical handoff using Authentication Certificate in GPRS-WLAN tightly coupled integrated networks