All Stories

  1. Cryptanalysis on “a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity ”
  2. PCNNCEC: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration
  3. Mobile Application-Based Sign Language Detector for Deaf People
  4. Data Analytics Applications in Healthcare, Hospitality, Marketing, and Security
  5. AI-based wavelet and stacked deep learning architecture for detecting coronavirus (COVID-19) from chest X-ray images
  6. A Chaotic System and Count Tracking Mechanism-based Dynamic S-Box and Secret Key Generation
  7. Privacy-Preserving Federated Learning for Internet of Medical Things Under Edge Computing
  8. Artificial Intelligence-Based Cyber Security Applications
  9. Intelligent Autonomous Drones in Industry 4.0
  10. Comparative Study of Graph Theory for Network System
  11. Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system
  12. Optimized Learning Strategy Towards Research-LED Teaching Curriculum Development
  13. College music education and teaching based on AI techniques
  14. Guest Editorial: Introduction to the special section on security and privacy in the big data era (VSI-spbd)
  15. Content-Based Music Recommendation Using Non-Stationary Bayesian Reinforcement Learning
  16. Blockchain architecture, taxonomy, challenges, and applications
  17. Blockchain for digital rights management
  18. Blockchain for intrusion detection systems
  19. Psychological Perceptual Analysis Based on Dance Therapy Using Artificial Intelligence Techniques
  20. Optimized Tree Strategy with Principal Component Analysis Using Feature Selection-Based Classification for Newborn Infant’s Jaundice Symptoms
  21. Soccer player activity prediction model using an internet of things-assisted wearable system
  22. Ensuring Improved Security in Medical Data Using ECC and Blockchain Technology with Edge Devices
  23. Artificial intelligence on economic evaluation of energy efficiency and renewable energy technologies
  24. Effect of environmental and social responsibility in energy-efficient management models for smart cities infrastructure
  25. Efficient privacy-preserving anonymous authentication scheme for human predictive online education system
  26. GCACS-IoD: A certificate based generic access control scheme for Internet of drones
  27. COVID_SCREENET: COVID-19 Screening in Chest Radiography Images Using Deep Transfer Stacking
  28. Guest editorial of the special issue “remote sensing in water management and hydrology”
  29. An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks
  30. BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs
  31. Public key encryption with equality test for Industrial Internet of Things system in cloud computing
  32. PEVRM: Probabilistic Evolution Based Version Recommendation Model for Mobile Applications
  33. A Novel Performance Enhancing Task Scheduling Algorithm for Cloud-Based E-Health Environment
  34. A Comparative Study of Energy Retaining Objective Functions in RPL for Improving Network Lifetime in IoT Environment
  35. Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs
  36. A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography
  37. A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification
  38. A lightweight machine learning-based authentication framework for smart IoT devices
  39. Security analysis on “mutual authentication scheme for multimedia medical information systems”
  40. A Novel Performance Enhancing Task Scheduling Algorithm for Cloud-Based E-Health Environment
  41. Bio-inspired cryptosystem with DNA cryptography and neural networks
  42. A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things
  43. An efficient and secure remote user mutual authentication scheme using smart cards for Telecare medical information systems
  44. Efficient Spectrum Management Techniques for Cognitive Radio Networks for Proximity Service
  45. Probability-Based Centralized Device for Spectrum Handoff in Cognitive Radio Networks
  46. An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment
  47. Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES
  48. Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments
  49. A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
  50. Introduction to the special section on Big data and IoT in e-healthcare
  51. Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments
  52. A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
  53. Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
  54. Modification of AES using genetic algorithms for high-definition image encryption
  55. Consistent and effective energy utilisation of node model for securing data in wireless sensor networks
  56. Labelled decision-making method based on neural network model and pruning algorithm
  57. A New Malware Detection System Using Machine Learning Techniques for API Call Sequences
  58. A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server
  59. An efficient secure communication for healthcare system using wearable devices
  60. Preface
  61. An enhanced 1-round authentication protocol for wireless body area networks with user anonymity
  62. CT and MRI Image Fusion Based on Discrete Wavelet Transform and Type-2 Fuzzy Logic
  63. Comparative study of cloud platforms to develop a Chatbot
  64. An Efficient DWT and Intuitionistic Fuzzy Based Multimodality Medical Image Fusion
  65. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
  66. Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
  67. Wireless and Mobile Networks: Security and Privacy Issues
  68. Security on “Secure Remote Login Scheme with Password and Smart Card Update Facilities”
  69. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications
  70. A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks
  71. An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks
  72. A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks
  73. A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
  74. Security problems of a “more secure remote user authentication scheme”
  75. Remote user authentication scheme using smart card: a review
  76. Cryptanalysis and an Improvement of New Remote Mutual Authentication Scheme using Smart Cards
  77. A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks
  78. A secure remote user mutual authentication scheme using smart cards
  79. Cryptanalysis of oPass
  80. Scalable and secure data sharing for dynamic groups in cloud
  81. An efficient technique for preventing SQL injection attack using pattern matching algorithm