scroll to top
0

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "Islam, SK Hafizul"

1 - 10 of 137 results for
 "Islam, SK Hafizul"
Results per page:

Cybersecurity Attack-Resilience Authentication Mechanism for Intelligent Healthcare System.

Publication Type: Academic Journal

Source(s): IEEE Transactions on Industrial Informatics; Jan2023, Vol. 19 Issue 1, p830-840, 11p

Abstract: Copyright of IEEE Transactions on Industrial Informatics is the property of IEEE and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print,...

View details

Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications.

Publication Type: Academic Journal

Source(s): Multimedia Tools & Applications; Dec2022, Vol. 81 Issue 29, p41545-41577, 33p

Abstract: Copyright of Multimedia Tools & Applications is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, ...

View details

An Improved Authentication Scheme for Remote Data Access and Sharing Over Cloud Storage in Cyber-Physical-Social-Systems

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 8, Pp 47144-47160 (2020)

Abstract: Cyber-physical-social systems (CPSSs) epitomize an evolving paradigm, including the social, physical, and cyber world. The vital goal of CPSSs is to offer personalized, high-quality, and proactive services for the end-users. An ingenious framework for ...

View details

IEEE Access Special Section Editorial: Security and Privacy for Cloud and IoT

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 8, Pp 219690-219694 (2020)

Abstract: The Internet of Things (IoT), which enables a wide variety of embedded devices, sensors, and actuators (known as smart things) to interconnect and exchange data, is a promising network scenario for bridging physical devices and virtual objects in the c...

View details

Improved ECC-Based Three-Factor Multiserver Authentication Scheme

Publication Type: Academic Journal

Source(s): Security and Communication Networks, Vol 2021 (2021)

Abstract: A multiserver environment can improve the efficiency of mobile network services more effectively than a single server in managing the increase in users. Because of the large number of users, the security of users’ personal information and communication...

View details

DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre

Publication Type: Academic Journal

Source(s): Security and Communication Networks, Vol 2021 (2021)

Abstract: The heterogeneous resource-required application tasks increase the cloud service provider (CSP) energy cost and revenue by providing demand resources. Enhancing CSP profit and preserving energy cost is a challenging task. Most of the existing approache...

View details

A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments.

Publication Type: Academic Journal

Source(s): Wireless Networks (10220038); Oct2022, Vol. 28 Issue 7, p3127-3142, 16p

Abstract: Copyright of Wireless Networks (10220038) is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, dow...

View details

A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication

Publication Type: Academic Journal

Source(s): Journal of King Saud University: Computer and Information Sciences, Vol 29, Iss 1, Pp 63-73 (2017)

Abstract: Recently, many identity-based two-party authenticated key agreement (ID-2PAKA) protocols using elliptic curve cryptography (ECC) have been proposed, however, these protocols do not provide adequate security and their computation costs are also relative...

View details

Radiological image retrieval technique using multi-resolution texture and shape features.

Publication Type: Academic Journal

Source(s): Multimedia Tools & Applications; Apr2022, Vol. 81 Issue 10, p13633-13660, 28p

Abstract: Copyright of Multimedia Tools & Applications is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, ...

View details

Deep learning techniques for observing the impact of the global warming from satellite images of water-bodies.

Publication Type: Academic Journal

Source(s): Multimedia Tools & Applications; Feb2022, Vol. 81 Issue 5, p6115-6130, 16p

Abstract: Copyright of Multimedia Tools & Applications is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, ...

View details
sponsored