Change search
Refine search result
1 - 2 of 2
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Challa, Srinavi
    et al.
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad .
    Kumar Das, Ashok
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad .
    Odelu, Vanga
    Department of Computer Science and Engineering, Indian Institute of Information Technology Chittoor.
    Kumar, Neeraj
    Department of Computer Science and Engineering, Thapar University, Patiala .
    Kumari, Sari
    Department of Mathematics, Ch. Charan Singh University, Meerut .
    Khan, Muhammad Khurram
    Center of Excellence in Information Assurance, King Saud University, Riyadh.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks2017In: Computers & electrical engineering, ISSN 0045-7906, E-ISSN 1879-0755, Vol. 69, p. 534-554Article in journal (Refereed)
    Abstract [en]

    We first show the security limitations of a recent user authentication scheme proposed for wireless healthcare sensor networks. We then present a provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. The proposed scheme supports functionality features, such as dynamic sensor node addition, password as well as biometrics update, smart card revocation along with other usual features required for user authentication in wireless sensor networks. Our scheme is shown to be secure through the rigorous formal security analysis under the Real-Or-Random (ROR) model and broadly-accepted Burrows-Abadi-Needham (BAN) logic. Furthermore, the simulation through the widely-known Automated Validation of Internet Security Protocols and Applications (AVISPA) tool shows that our scheme is also secure. High security, and low communication and computation costs make our scheme more suitable for practical application in healthcare applications as compared to other related existing schemes.

  • 2.
    Noor, Ayman
    et al.
    Newcastle University, Newcastle upon Tyne, UK. Taibah University, Madinah, Saudi Arabia.
    Mitra, Karan
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Solaiman, Ellis
    Newcastle University, Newcastle upon Tyne, UK.
    Souza, Arthur
    Federal University of Rio Grande do Norte, Natal, Brazil.
    Jha, Devki Nandan
    Newcastle University, Newcastle upon Tyne, UK.
    Demirbaga, Umit
    Newcastle University, Newcastle upon Tyne, UK. Bartin University, Bartin, Turkey.
    Jayaraman, Prem Prakash
    Swinburne University of Technology, Melbourne, Australia.
    Cacho, Nelio
    Federal University of Rio Grande do Norte, Natal, Brazil.
    Ranjan, Rajiv
    Newcastle University, Newcastle upon Tyne, UK.
    Cyber-physical application monitoring across multiple clouds2019In: Computers & electrical engineering, ISSN 0045-7906, E-ISSN 1879-0755, Vol. 77, p. 314-324Article in journal (Refereed)
    Abstract [en]

    Cyber-physical systems (CPS) integrate cyber-infrastructure comprising computers and networks with physical processes. The cyber components monitor, control, and coordinate the physical processes typically via actuators. As CPS are characterized by reliability, availability, and performance, they are expected to have a tremendous impact not only on industrial systems but also in our daily lives. We have started to witness the emergence of cloud-based CPS. However, cloud systems are prone to stochastic conditions that may lead to quality of service degradation. In this paper, we propose M2CPA - a novel framework for multi-virtualization, and multi-cloud monitoring in cloud-based cyber-physical systems. M2CPA monitors the performance of application components running inside multiple virtualization platforms deployed on multiple clouds. M2CPA is validated through extensive experimental analysis using a real testbed comprising multiple public clouds and multi-virtualization technologies.

1 - 2 of 2
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf