• Login
    Search 
    •   DSpace Home
    • ADU Repository
    • Engineering
    • Search
    •   DSpace Home
    • ADU Repository
    • Engineering
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 78

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Blockchain-based authentication in internet of vehicles: a survey 

    Abbas, Sohail; Abu Talib, Manar; Ahmed, Afaf; Khan, Faheem; Ahmad, Shabir (Multidisciplinary Digital Publishing Institute, 2021-01)
    Internet of Vehicles (IoV) has emerged as an advancement over the traditional Vehicular Ad-hoc Networks (VANETs) towards achieving a more efficient intelligent transportation system that is capable of providing various ...
    Thumbnail

    Implementation and practical problems of chaos-based cryptography revisited 

    Sen Teh, Je; Alawida, Moatsum; Cheng, sii you (Elsevier, 2020-02)
    Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in real-world scenarios are minimal as compared to conventional ...
    Thumbnail

    A Framework for Key Management Architecture for DTN (KMAD): Requirements and Design 

    Mumtaz Bhutta, Muhammad Nasir; Cruickshank, Haitham; Nadeem, Adnan (IEEE, 2020-08)
    Key Management in Delay Tolerant Networks (DTN) still remains an unsolved complex problem. Due to peculiar characteristics of DTN, important challenges that make it difficult to design key management architecture are: 1) ...
    Thumbnail

    A Key Transport Protocol for Advance Metering Infrastructure (AMI) Based on Public Key Cryptography 

    Naseer, Hira; Mumtaz Bhutta, Muhammad Nasir; Alojail, Mohammed Ali (IEEE, 2020)
    Advance metering infrastructure (AMI) is an important element of the Smart Grid as it is expectable to simplify the transport of meter reading and control information from meters to the utility provider. Smart meters are ...
    Thumbnail

    An elliptic curve cryptography based lightweight authentication scheme for smart grid communication 

    Mahmood, Khalid; Chaudhry, Shehzad Ashraf; Naqvi, Husnain; ETAL.. (ScienceDirect, 2018-04)
    An evolved grid system, Smart Grid, enables appropriate adjustments in the amount of electricity generation by providing the capability to monitor the consumption behavior of customers. This advance grid system can help ...
    Thumbnail

    Efficient end-to-end authentication protocol for wearable health monitoring systems 

    Jiang, Qi; Ma, Jianfeng; Yang, Chao; Ma, Xindi; Shen, Jian; Chaudhry, Shehzad Ashraf (ScienceDirect, 2017-10)
    Wearable health monitoring systems (WHMSs) will play an increasingly important role in future e-healthcare and enable smart and ubiquitous healthcare services. Given its sensitivity, the health data should be protected ...
    Thumbnail

    An improved and provably secure privacy preserving authentication protocol for SIP 

    Chaudhry, Shehzad Ashraf; Naqvi, Husnain; Sher, Muhammad; ETAL.. (Springer Link, 2015-09)
    Session Initiation Protocol (SIP) has proved to be the integral part and parcel of any multimedia based application or IP-based telephony service that requires signaling. SIP supports HTTP digest based authentication, and ...
    Thumbnail

    An improved smart card based authentication scheme for session initiation protocol 

    Kumari, Saru; Chaudhry, Shehzad Ashraf; Wu, Fan; ETAL.. (Springer Link, 2015-09)
    Sessioninitiation protocol (SIP) reformed the controlling routine of voice over Internet Protocol based communication over public channels. SIP is inherently insecure because of underlying open text architecture. A number ...
    Thumbnail

    An enhanced privacy preserving remote user authentication scheme with provable security 

    Chaudhry, Shehzad Ashraf; Farash, Mohammad Sabzinejad; Naqvi, Husnain; ETAL.. (ResearchGate, 2015-06)
    Very recently, Kumari et al. proposed a symmetric key and smart card-based remote user password authentication scheme to enhance Chung et al.’s scheme. They claimed their enhanced scheme to provide anonymity while resisting ...
    Thumbnail

    Securing smart city surveillance: A lightweight authentication mechanism for unmanned vehicles 

    Ali, Zeeshan; Chaudhry, Shehzad Ashraf; Ramzan, Muhammad Sher; ETAL.. (IEEE Xplore, 2020-02)
    The significance of the Internet of Drones (IoD) is increasing steadily and now IoD is being practiced in many military and civilian-based applications. IoD facilitates real-time data access to the users especially the ...
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 8

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CommunityBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Discover

    AuthorChaudhry, Shehzad Ashraf (71)ETAL.. (48)Irshad, Azeem (16)Mahmood, Khalid (13)Naqvi, Husnain (7)Ali, Zeeshan (6)Ghani, Anwar (6)Sher, Muhammad (6)Alzahrani, Bander A (5)Hussain, Sajid (5)... View MoreSubject
    Authentication (78)
    Security (20)Protocols (13)ProVerif (13)Elliptic curve cryptography (12)Internet of things (9)Anonymity (8)Cryptography (8)Protocol (8)Servers (8)... View MoreDate Issued2020 - 2022 (43)2010 - 2019 (35)Has File(s)No (63)Yes (15)

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV