All Stories

  1. SeBAC-IoD: A Secure and Efficient Batch Access Control Technique for Internet of Drones
  2. PSL-IoD: PUF-Based Secure Last-Mile Drone Delivery in Supply Chain Management
  3. AI-driven predictive modeling for disease prevention and early detection
  4. FA-SMW: Fog-Driven Anonymous Lightweight Access Control for Smart Medical Wearables
  5. PBatch: Pseudonym Certificate Batch Authentication With Generative AI-Based Cache for Cooperative Intelligent Transportation Systems
  6. SDN-Assisted Spatial Encoded Sequence Enabled BLSTM-Based Zero-Trust Anomaly Detection Model for Consumer Electronics of Smart Cities
  7. TS-PAID: A Two-Stage PUF-Based Lightweight Authentication Protocol for Internet of Drones
  8. BSP-IoD: A Secure Drone-enabled Authentication Protocol using Barrel-Shifter PUF
  9. SAC-DeV: Secure Access Control for Drone-Assisted edge computing in e-VANETs
  10. GUEST EDITORIAL Enhancing Edge-based consumer electronics devices and IoT Ecosystem with Post Quantum Cryptosystem: Security Challenges and Solutions”
  11. PDCM-IoD: A lightweight PUF-based Drone Access Control Mechanism for Internet of Drones
  12. Secure and Reliable Authentication Protocol for Energy Internet-Enabled Vehicle-to-Grid Communication System
  13. Correction to: ReSOTS: RFID/IoT-Enabled Secure Object Tracking Key Exchange for Trustworthy Smart Logistics
  14. ReSOTS: RFID/IoT-Enabled Secure Object Tracking Key Exchange for Trustworthy Smart Logistics
  15. SAWPS: Secure Access Control for Wearable Plant Sensors—Reinforcing Agriculture 4.0
  16. SPAKE-DC: A Secure PUF Enabled Authenticated Key Exchange for 5G-Based Drone Communications
  17. DAC‐MD: A privacy preserving drone‐access control scheme for last mile delivery
  18. A Novel Self-Calibrated UWB-Based Indoor Localization Systems for Context-Aware Applications
  19. Modeling Topic-Specific Influential Users in QA Forums Using Association Rule Mining
  20. SEMS-5G: A Secure and Efficient Multi-Server Authentication Scheme for 5G Networks
  21. MCLA Task Offloading Framework for 5G-NR-V2X-Based Heterogeneous VECNs
  22. SUSIC: A Secure User Access Control Mechanism for SDN-Enabled IIoT and Cyber–Physical Systems
  23. Energy efficient indoor localisation for narrowband internet of things
  24. Identification and Visualization of Spatial and Temporal Trends in Textile Industry
  25. BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment
  26. ReSOTS: RFID/IoT-enabled Secure Object Tracking Key Exchange for Trustworthy Smart Logistics
  27. An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics
  28. Architecture, Protocols, and Security in IoV: Taxonomy, Analysis, Challenges, and Solutions
  29. Review: a comparative study of state-of-the-art skin image segmentation techniques with CNN
  30. An Automated Approach for the Prediction of the Severity Level of Bug Reports Using GPT-2
  31. Security Hardened and Privacy Preserved Vehicle-to-Everything (V2X) Communication
  32. A resource friendly authentication scheme for space–air–ground–sea integrated Maritime Communication Network
  33. A low-cost privacy preserving user access in mobile edge computing framework
  34. Assessing Land Cover Transformation for Urban Environmental Sustainability through Satellite Sensing
  35. Practitioner’s view of the success factors for software outsourcing partnership formation: an empirical exploration
  36. The Trajectories, Trends, and Opportunities for Assessing Urban Ecosystem Services: A Systematic Review of Geospatial Methods
  37. Industrial Automation Information Analogy for Smart Grid Security
  38. Empirical Analysis of Machine Learning Algorithms for Multiclass Prediction
  39. SKIA‐SH: A Symmetric Key‐Based Improved Lightweight Authentication Scheme for Smart Homes
  40. A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System
  41. Quality Prediction of Wearable Apps in the Google Play Store
  42. Spark Spectrum Allocation for D2D Communication in Cellular Networks
  43. Classification and Prediction of Software Incidents Using Machine Learning Techniques
  44. Software Defined Network Enabled Fog-to-Things Hybrid Deep Learning Driven Cyber Threat Detection System
  45. A secure demand response management authentication scheme for smart grid
  46. A Physical Capture Resistant Authentication Scheme for the Internet of Drones
  47. An anonymous device to device access control based on secure certificate for internet of medical things systems
  48. Adaptive Fault-Tolerant System and Optimal Power Allocation for Smart Vehicles in Smart Cities Using Controller Area Network
  49. A Novel Pairing-Free Lightweight Authentication Protocol for Mobile Cloud Computing Framework
  50. Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server
  51. A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment
  52. Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment
  53. Comment on ‘ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications’
  54. A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System
  55. Smart workload migration on external cloud service providers to minimize delay, running time, and transfer cost
  56. Further comments on ‘SFVCC: Chaotic map‐based security framework for vehicular cloud computing’
  57. Comment on ‘SFVCC: Chaotic map‐based security framework for vehicular cloud computing’
  58. A secure and efficient remote patient-monitoring authentication protocol for cloud-IoT
  59. A Provably Secure and Lightweight Patient-Healthcare Authentication Protocol in Wireless Body Area Networks
  60. An Improved SIP Authenticated Key Agreement Based on Dongqing et al.
  61. A provably secure and efficient authenticated key agreement scheme for Energy Internet based Vehicle-to-Grid technology framework
  62. An Improved Lightweight Authentication Protocol for Wireless Body Area Networks
  63. An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol
  64. A provable and secure mobile user authentication scheme for mobile cloud computing services
  65. Performance analysis of secure communications over correlated slow-fading additive white Gaussian noise channels
  66. Ranked Sense Multiple Access Control Protocol for Multichannel Cognitive Radio-Based IoT Networks
  67. An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre
  68. Handshake Sense Multiple Access Control for Cognitive Radio-Based IoT Networks
  69. Self-Citation Analysis on Google Scholar Dataset for H-Index Corrections
  70. An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment
  71. Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee’s Scheme
  72. A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.’s Scheme
  73. Adaptive and Economically-Robust Group Selling of Spectrum Slots for Cognitive Radio-Based Networks
  74. An efficient and secure design of multi-server authenticated key agreement protocol
  75. Multiple Access Control for Cognitive Radio-Based IEEE 802.11ah Networks
  76. Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
  77. A secure mutual authenticated key agreement of user with multiple servers for critical systems
  78. An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture
  79. An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification
  80. An improved lightweight multiserver authentication scheme
  81. An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo’s Scheme
  82. An improved and secure chaotic map based authenticated key agreement in multi-server architecture
  83. An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture
  84. An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services
  85. A provably secure anonymous authentication scheme for Session Initiation Protocol
  86. A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme
  87. Comments on “A privacy preserving three-factor authentication protocol for e-health clouds”
  88. Spread Spectrum Based Energy Efficient Collaborative Communication in Wireless Sensor Networks
  89. An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre
  90. Flexible and efficient aggregation framework for antifragile wireless mesh networks
  91. An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
  92. Skill Specific Spoken Dialogues Based Personalized ATM Design to Maximize Effective Interaction for Visually Impaired Persona
  93. A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
  94. A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
  95. An Algorithm for Prediction of Overhead Messages in Client-Server Based Wireless Networks
  96. Hash-chain based peer-peer key management and establishment of security associations in MANETS
  97. Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers
  98. Performance Evaluation of Authentication Certificate Based Seamless Vertical Handoff in GPRS-WLAN
  99. Performance Evaluation Analysis of Group Mobility in Mobile Ad Hoc Networks
  100. A secure interaction among nodes from different MANET groups using 4G technologies
  101. Authentication of Nodes among Different Symmetric Key Groups in MANETs Using 4G Technologies
  102. Certificate chain based authentication in MANETS using 4th generation technologies
  103. Seamless vertical handoff using Authentication Certificate in GPRS-WLAN tightly coupled integrated networks