Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Daniel P. Kennedy
Roland Zumkeller
Maximilian Dürr
Dan Graur
Liangliang Shang
Chen Ma
Barbara Aquilani
Javier Marcello
Yang Xu
Hui Tian
Home
/
Author
/
ASHOK KUMAR DAS
Author Info
Open Visualization
Name
Affiliation
Papers
ASHOK KUMAR DAS
International Institute of Information Technology, Bhubaneswar, Bhubaneswar, India
266
Collaborators
Citations
PageRank
285
2250
122.93
Referers
Referees
References
2547
4608
5394
Search Limit
100
1000
Publications (100 rows)
Collaborators (100 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for IoT applications
0
0.34
2022
DDoS attack resisting authentication protocol for mobile based online social network applications
0
0.34
2022
Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system
0
0.34
2022
Designing Fine-Grained Access Control for Software-Defined Networks Using Private Blockchain
1
0.35
2022
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system
0
0.34
2022
PassWalk: Spatial Authentication Leveraging Lateral Shift and Gaze on Mobile Headsets
0
0.34
2022
Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions
0
0.34
2022
Uniting cyber security and machine learning: Advantages, challenges and future research
0
0.34
2022
SLAP-IoD: Secure and Lightweight Authentication Protocol Using Physical Unclonable Functions for Internet of Drones in Smart City Environments
0
0.34
2022
On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System
4
0.37
2021
SDN-chain: Privacy-preserving protocol for software defined networks using blockchain
0
0.34
2021
Private Blockchain-Envisioned Multi-Authority Cp-Abe-Based User Access Control Scheme In Iiot
0
0.34
2021
SPCS-IoTEH: Secure Privacy-Preserving Communication Scheme for IoT-Enabled e-Health Applications
0
0.34
2021
An Enhanced Lightweight And Secured Authentication Protocol For Vehicular Ad-Hoc Network
1
0.35
2021
Laptas: Lightweight Anonymous Privacy-Preserving Three-Factor Authentication Scheme For Wsn-Based Iiot
1
0.35
2021
Private Blockchain-Based Access Control Mechanism For Unauthorized Uav Detection And Mitigation In Internet Of Drones Environment
5
0.47
2021
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters
0
0.34
2021
On The Design Of Secure Communication Framework For Blockchain-Based Internet Of Intelligent Battlefield Things Environment
0
0.34
2020
LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment
9
0.43
2020
A Smart Waste Management Solution Geared towards Citizens.
1
0.35
2020
On the Design of Blockchain-Based Access Control Protocol for IoT-Enabled Healthcare Applications
1
0.35
2020
Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment
3
0.38
2020
Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment.
0
0.34
2020
Cache Poisoning Prevention Scheme In 5g-Enabled Vehicular Networks: A Tangle-Based Theoretical Perspective
0
0.34
2020
Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges.
2
0.39
2020
On the Design of Blockchain-Based Access Control Scheme for Software Defined Networks
1
0.35
2020
Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment
14
0.53
2020
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment.
8
0.41
2020
On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment
6
0.39
2020
Authentication in cloud-driven IoT-based big data environment: Survey and outlook
4
0.45
2019
User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions
0
0.34
2019
Design of secure key management and user authentication scheme for fog computing services.
15
0.55
2019
Design And Analysis Of Secure Lightweight Remote User Authentication And Key Agreement Scheme In Internet Of Drones Deployment
6
0.39
2019
ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System.
3
0.38
2019
Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications.
7
0.44
2019
Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions.
3
0.39
2019
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
1
0.35
2019
A Provably Secure And Lightweight Anonymous User Authenticated Session Key Exchange Scheme For Internet Of Things Deployment
3
0.36
2019
Iomt Malware Detection Approaches: Analysis And Research Challenges
0
0.34
2019
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
2
0.38
2019
Taxonomy and analysis of security protocols for Internet of Things.
6
0.48
2018
Demand Response Management Using Lattice-Based Cryptography in Smart Grids.
0
0.34
2018
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.
17
0.57
2018
Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography.
7
0.42
2018
Secure Message Communication Protocol Among Vehicles in Smart City.
14
0.48
2018
Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things.
17
0.54
2018
Mixed Unit Interval Bigraphs.
0
0.34
2018
Provably Secure Authenticated Key Agreement Scheme for Smart Grid.
12
0.52
2018
HEAP: An Efficient and Fault-Tolerant Authentication and Key Exchange Protocol for Hadoop-Assisted Big Data Platform.
0
0.34
2018
2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment.
4
0.38
2018
1
2
50 / page