DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.523
1.
  • Robust Biometrics-Based Aut... Robust Biometrics-Based Authentication Scheme for Multiserver Environment
    He, Debiao; Wang, Ding IEEE systems journal, 09/2015, Letnik: 9, Številka: 3
    Journal Article
    Recenzirano

    The authentication scheme is an important cryptographic mechanism, through which two communication parties could authenticate each other in the open network environment. To satisfy the requirement of ...
Celotno besedilo
Dostopno za: UL
2.
  • An Efficient Identity-Based... An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    Debiao He; Zeadally, Sherali; Baowen Xu ... IEEE transactions on information forensics and security, 2015-Dec., 2015-12-00, 20151201, Letnik: 10, Številka: 12
    Journal Article
    Recenzirano

    By broadcasting messages about traffic status to vehicles wirelessly, a vehicular ad hoc network (VANET) can improve traffic safety and efficiency. To guarantee secure communication in VANETs, ...
Celotno besedilo
Dostopno za: UL
3.
  • BPAS: Blockchain-Assisted P... BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks
    Feng, Qi; He, Debiao; Zeadally, Sherali ... IEEE transactions on industrial informatics, 06/2020, Letnik: 16, Številka: 6
    Journal Article

    If all vehicles are connected together through a wireless communication channel, vehicular ad hoc networks (VANETs) can support a wide range of real-time traffic information services, such as ...
Celotno besedilo
Dostopno za: UL
4.
  • A lightweight authenticatio... A lightweight authentication and key agreement scheme for Internet of Drones
    Zhang, Yunru; He, Debiao; Li, Li ... Computer communications, 03/2020, Letnik: 154
    Journal Article
    Recenzirano

    Drones in Internet of Drones (IoD) can be able to reconnoiter environment, transport the commodity with the help of embedded various sensors. They have been widely used in various fields and brought ...
Celotno besedilo
Dostopno za: UL
5.
  • Blockchain in healthcare ap... Blockchain in healthcare applications: Research challenges and opportunities
    McGhin, Thomas; Choo, Kim-Kwang Raymond; Liu, Charles Zhechao ... Journal of network and computer applications, 06/2019, Letnik: 135
    Journal Article
    Recenzirano

    Blockchain has a range of built-in features, such as distributed ledger, decentralized storage, authentication, security, and immutability, and has moved beyond hype to practical applications in ...
Celotno besedilo
Dostopno za: UL
6.
  • Efficient and Anonymous Mob... Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures
    Debiao He; Zeadally, Sherali; Kumar, Neeraj ... IEEE transactions on information forensics and security, 09/2016, Letnik: 11, Številka: 9
    Journal Article
    Recenzirano

    Rapid advances in wireless communication technologies have paved the way for a wide range of mobile devices to become increasingly ubiquitous and popular. Mobile devices enable anytime, anywhere ...
Celotno besedilo
Dostopno za: UL
7.
  • An Analysis of RFID Authent... An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography
    Debiao He; Zeadally, Sherali IEEE internet of things journal, 02/2015, Letnik: 2, Številka: 1
    Journal Article

    Advances in information and communication technologies have led to the emergence of Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings convenience to ...
Celotno besedilo
Dostopno za: UL
8.
  • Lightweight three-factor au... Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks
    Qi Jiang; Zeadally, Sherali; Jianfeng Ma ... IEEE access, 2017, Letnik: 5
    Journal Article
    Recenzirano
    Odprti dostop

    Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity connected to the ...
Celotno besedilo
Dostopno za: UL

PDF
9.
  • Identity-Based Proxy-Orient... Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
    Wang, Huaqun; He, Debiao; Tang, Shaohua IEEE transactions on information forensics and security, 06/2016, Letnik: 11, Številka: 6
    Journal Article
    Recenzirano

    More and more clients would like to store their data to public cloud servers (PCSs) along with the rapid development of cloud computing. New security problems have to be solved in order to help more ...
Celotno besedilo
Dostopno za: UL
10.
  • Blockchain-Based Privacy-Pr... Blockchain-Based Privacy-Preserving and Rewarding Private Data Sharing for IoT
    Li, Tian; Wang, Huaqun; He, Debiao ... IEEE internet of things journal, 08/2022, Letnik: 9, Številka: 16
    Journal Article

    The Internet of Things (IoT) devices possessed by individuals produce massive amounts of data. The private data onto specific IoT devices can be combined with intelligent platform to provide help for ...
Celotno besedilo
Dostopno za: UL
1 2 3 4 5
zadetkov: 1.523

Nalaganje filtrov