Άρθρα με εντολές δημόσιας πρόσβασης - Muhammad Khurram KhanΜάθετε περισσότερα
Δεν είναι διαθέσιμο πουθενά: 69
A survey on privacy protection in blockchain system
Q Feng, D He, S Zeadally, MK Khan, N Kumar
Journal of network and computer applications 126, 45-58, 2019
Εντολές: National Natural Science Foundation of China
A robust and anonymous patient monitoring system using wireless medical sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, N Kumar
Future Generation Computer Systems 80, 483-495, 2018
Εντολές: Council of Scientific and Industrial Research, India, Department of Science …
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, L Leng, N Kumar
Computer Networks 101, 42-62, 2016
Εντολές: National Natural Science Foundation of China
Enhancing security and privacy for identity-based batch verification scheme in VANETs
SF Tzeng, SJ Horng, T Li, X Wang, PH Huang, MK Khan
IEEE Transactions on Vehicular Technology 66 (4), 3235-3248, 2015
Εντολές: Chinese Academy of Sciences
An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
SJ Horng, SF Tzeng, PH Huang, X Wang, T Li, MK Khan
Information Sciences 317, 48-66, 2015
Εντολές: Chinese Academy of Sciences
A privacy preserving three-factor authentication protocol for e-health clouds
Q Jiang, MK Khan, X Lu, J Ma, D He
The Journal of Supercomputing 72, 3826-3849, 2016
Εντολές: National Natural Science Foundation of China
Efficient privacy-aware authentication scheme for mobile cloud computing services
D He, N Kumar, MK Khan, L Wang, J Shen
IEEE Systems Journal 12 (2), 1621-1631, 2016
Εντολές: National Natural Science Foundation of China
PoRX: A reputation incentive scheme for blockchain consensus of IIoT
EK Wang, Z Liang, CM Chen, S Kumari, MK Khan
Future generation computer systems 102, 140-151, 2020
Εντολές: National Natural Science Foundation of China
On emerging family of elliptic curves to secure internet of things: ECC comes of age
Z Liu, X Huang, Z Hu, MK Khan, H Seo, L Zhou
IEEE Transactions on Dependable and Secure Computing 14 (3), 237-248, 2016
Εντολές: Natural Sciences and Engineering Research Council of Canada, National …
Efficient certificateless aggregate signature with conditional privacy preservation in IoV
Q Mei, H Xiong, J Chen, M Yang, S Kumari, MK Khan
IEEE Systems Journal 15 (1), 245-256, 2020
Εντολές: National Natural Science Foundation of China
An improved remote user authentication scheme with key agreement
S Kumari, MK Khan, X Li
Computers & Electrical Engineering 40 (6), 1997-2012, 2014
Εντολές: National Natural Science Foundation of China
Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems
SH Islam, MK Khan
Journal of medical systems 38 (10), 135, 2014
Εντολές: National Natural Science Foundation of China
Certificateless searchable public key encryption scheme for mobile healthcare system
M Ma, D He, MK Khan, J Chen
Computers & Electrical Engineering 65, 413-424, 2018
Εντολές: National Natural Science Foundation of China
Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems
D Mishra, S Mukhopadhyay, A Chaturvedi, S Kumari, MK Khan
Journal of medical systems 38, 1-12, 2014
Εντολές: National Natural Science Foundation of China
Binary Artificial Bee Colony optimization using bitwise operation
D Jia, X Duan, MK Khan
Computers & Industrial Engineering 76, 360-365, 2014
Εντολές: National Natural Science Foundation of China
A secure chaotic map-based remote authentication scheme for telecare medicine information systems
X Li, F Wu, MK Khan, L Xu, J Shen, M Jo
Future Generation Computer Systems 84, 149-159, 2018
Εντολές: National Natural Science Foundation of China
Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing
SKH Islam, MK Khan, AM Al‐Khouri
Security and communication networks 8 (13), 2214-2231, 2015
Εντολές: National Natural Science Foundation of China
Privacy-preserving data aggregation against malicious data mining attack for IoT-enabled smart grid
J Wang, L Wu, S Zeadally, MK Khan, D He
ACM Transactions on Sensor Networks (TOSN) 17 (3), 1-25, 2021
Εντολές: National Natural Science Foundation of China
Efficient RFID authentication using elliptic curve cryptography for the internet of things
H Shen, J Shen, MK Khan, JH Lee
Wireless personal communications 96, 5253-5266, 2017
Εντολές: National Natural Science Foundation of China
A remote cancelable palmprint authentication protocol based on multi‐directional two‐dimensional PalmPhasor‐fusion
L Leng, ABJ Teoh, M Li, MK Khan
Security and communication networks 7 (11), 1860-1871, 2014
Εντολές: National Natural Science Foundation of China
Τα στοιχεία έκδοσης και χρηματοδότησης καθορίζονται αυτόματα από ένα πρόγραμμα υπολογιστή