Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 199
1.
  • Secure Signature-Based Auth... Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
    Challa, Sravani; Wazid, Mohammad; Das, Ashok Kumar ... IEEE access, 2017, Letnik: 5
    Journal Article
    Recenzirano
    Odprti dostop

    Internet of Things (IoT) is a network of all devices that can be accessed through the Internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
2.
  • Towards a formally verified... Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks
    Hameed, Khizar; Khan, Abid; Ahmed, Mansoor ... Future generation computer systems, 20/May , Letnik: 82
    Journal Article
    Recenzirano

    The Internet of Things (IoT) is an emerging paradigm in which billions of devices communicate, thus producing and exchanging information related to real world objects (things). Sensor nodes are ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
3.
  • Design of Lightweight Authe... Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks
    Wazid, Mohammad; Das, Ashok Kumar; Kumar, Neeraj ... IEEE access, 01/2017, Letnik: 5
    Journal Article
    Recenzirano
    Odprti dostop

    Due to the widespread popularity in both academia and industry, vehicular ad hoc networks (VANETs) have been used in a wide range of applications starting from intelligent transportation to e-health ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
4.
  • An Enhanced Biometric Based... An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography
    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga ... PloS one, 05/2016, Letnik: 11, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. ...
Celotno besedilo
Dostopno za: DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK

PDF
5.
  • Hemostasis During Endoscopi... Hemostasis During Endoscopic Necrosectomy: Spray Coagulation Can be a Savior
    Kv, Andueep; Katukuri, Goutham Reddy; Lakhtakia, Sundeep ... The American journal of gastroenterology, 03/2022, Letnik: 117, Številka: 3
    Journal Article
    Recenzirano

    A spray coagulation (effect 2, Watts 50) was then performed using a triangular tip knife (Olympus, Tokyo, Japan) (e) that successfully achieved hemostasis (f). Noncontact method of spray coagulation ...
Celotno besedilo
Dostopno za: UL
6.
  • Provably Secure and Efficie... Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks
    Kisung Park; Youngho Park; Yohan Park ... IEEE access, 2017, Letnik: 5
    Journal Article
    Recenzirano
    Odprti dostop

    In global mobility networks, a mobile user can access roaming services using a mobile device at anytime and anywhere. However, mobile users can be vulnerable to various attacks by adversaries, ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
7.
  • Design of Mutually Authenti... Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment
    Reddy, Alavalapati Goutham; Yoon, Eun-Jun; Das, Ashok Kumar ... IEEE access, 2017, Letnik: 5
    Journal Article
    Recenzirano
    Odprti dostop

    Three-factor mutually authenticated key agreement protocols for multi-server environments have gained momentum in recent times due to advancements in wireless technologies and associated constraints. ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
8.
  • Provably Secure Pseudo-Iden... Provably Secure Pseudo-Identity Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Lightweight Mobile Devices
    Suresh, Devanapalli; Odelu, Vanga; Reddy, Alavalapati Goutham ... IEEE access, 2022, Letnik: 10
    Journal Article
    Recenzirano
    Odprti dostop

    Authentication and key agreement (AKA) play a major role in an open network environment to communicate between two or more participants securely. Authentication and key agreement protocols should ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
9.
  • Frequency-Reconfigurable Hy... Frequency-Reconfigurable Hybrid SIW-Based Self-Diplexing Antenna Using Solid and Liquid Dielectric Loading
    Reddy, Mettu Goutham; Subramanian, Karthikeyan Sholampettai; Pradhan, Nrusingha Charan ... IEEE transactions on circuits and systems. II, Express briefs, 05/2024, Letnik: 71, Številka: 5
    Journal Article
    Recenzirano

    This brief presents a novel frequency-reconfigurable self-diplexing antenna (SDA) utilizing a hybrid substrate-integrated waveguide (SIW). The antenna comprises a radiating slot, a feeding network, ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
10.
  • A Secure Anonymous Authenti... A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Eun-Jun Yoon ... IEEE access, 2016, Letnik: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Mobile user authentication is an essential topic to consider in the current communications technology due to greater deployment of handheld devices and advanced technologies. Memon et al. recently ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
1 2 3 4 5
zadetkov: 199

Nalaganje filtrov