Three stage fusion for effective time series forecasting using Bi-LSTM-ARIMA and improved DE-ABC algorithm | 0 | 0.34 | 2022 |
An Efficient Lightweight Privacy-Preserving Mechanism for Industry 4.0 Based on Elliptic Curve Cryptography | 0 | 0.34 | 2022 |
Planning in-hand dexterous micro-manipulation using 3-D rotations decomposition. | 0 | 0.34 | 2021 |
A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care | 7 | 0.50 | 2021 |
Detection of evil flies: securing air-ground aviation communication | 0 | 0.34 | 2021 |
SPIHT-based multiple image watermarking in NSCT domain | 2 | 0.37 | 2020 |
CT image denoising using NLM and its method noise thresholding | 1 | 0.36 | 2020 |
Crow-Penguin Optimizer For Multiobjective Task Scheduling Strategy In Cloud Computing | 1 | 0.35 | 2020 |
Blind noise estimation-based CT image denoising in tetrolet domain. | 0 | 0.34 | 2020 |
Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks. | 1 | 0.35 | 2019 |
Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks | 1 | 0.35 | 2019 |
E-Xy: An Entropy Based Xy Routing Algorithm | 0 | 0.34 | 2019 |
Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key Agreement | 0 | 0.34 | 2019 |
A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. | 40 | 0.98 | 2018 |
Multiple Watermarking for Healthcare Applications. | 10 | 0.49 | 2018 |
Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images. | 4 | 0.39 | 2018 |
An efficient anonymous authentication protocol in multiple server communication networks (EAAM). | 0 | 0.34 | 2018 |
A recent survey on image watermarking techniques and its application in e-governance. | 13 | 0.49 | 2018 |
Trust and Thermal Aware Routing Protocol (TTRP) for Wireless Body Area Networks. | 1 | 0.36 | 2017 |
Hybrid OPC Technique for Fast and Accurate Lithography Simulation. | 0 | 0.34 | 2017 |
Optimal extra links placement in mesh interconnection network using improved environmental adaptation method. | 0 | 0.34 | 2017 |
Robust watermarking technique using back propagation neural network: a security protection mechanism for social applications. | 5 | 0.40 | 2017 |
CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things. | 2 | 0.38 | 2017 |
Novel secure VPN architectures for LTE backhaul networks | 2 | 0.42 | 2016 |
Performance and security evaluation of intra-vehicular communication architecture | 1 | 0.35 | 2016 |
The Quest for Privacy in the Internet of Things. | 13 | 0.60 | 2016 |
Secure and Efficient Automatic Ruling in Three-Level Network Architecture. | 0 | 0.34 | 2015 |
Implementation and Evaluation of AREA-MAC Protocol on the DES-Testbed Platform. | 0 | 0.34 | 2015 |
Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-Based Approach. | 1 | 0.35 | 2015 |
Proxy-Based End-To-End Key Establishment Protocol For The Internet Of Things | 4 | 0.41 | 2015 |
An efficient and simple key distribution scheme for smart environments | 0 | 0.34 | 2014 |
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications | 14 | 0.69 | 2014 |
Delegation-based robust authentication model for wireless roaming using portable communication devices | 0 | 0.34 | 2014 |
Pauthkey: A Pervasive Authentication Protocol And Key Establishment Scheme For Wireless Sensor Networks In Distributed Iot Applications | 21 | 0.79 | 2014 |
A Mobile Object-Based Secret Key Distribution Scheme for Wireless Sensor Networks | 1 | 0.37 | 2013 |
Certificate-Based Pairwise Key Establishment Protocol for Wireless Sensor Networks | 4 | 0.48 | 2013 |
Selection of evolutionary approach based hybrid data mining algorithms for decision support systems and business intelligence | 0 | 0.34 | 2012 |
A Benchmark to Select Data Mining Based Classification Algorithms For Business Intelligence And Decision Support Systems | 2 | 0.38 | 2012 |
Scheduling using improved genetic algorithm in cloud computing for independent tasks | 12 | 0.91 | 2012 |
A Strong User Authentication Framework for Cloud Computing. | 25 | 1.17 | 2011 |
Effective Ways of Secure, Private and Trusted Cloud Computing | 7 | 0.60 | 2011 |
A User Authentication for Healthcare Application Using Wireless Medical Sensor Networks | 4 | 0.53 | 2011 |
Optimizing Duty-Cycle for Delay and Energy Bound WSN Applications | 4 | 0.48 | 2010 |
Secure health monitoring using medical wireless sensor networks | 12 | 0.78 | 2010 |
TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption. | 2 | 0.38 | 2010 |
Addressing secure data routing scheme for heterogeneous sensor networks | 1 | 0.39 | 2010 |
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography | 5 | 0.45 | 2010 |
A secure ubiquitous sensor network with Dragon | 0 | 0.34 | 2009 |
A real-time and energy-efficient MAC protocol for wireless sensor networks. | 9 | 0.59 | 2009 |
DES-SERT: A framework for structured routing protocol implementation | 9 | 0.61 | 2009 |