-
1by Palak Bagga, Ashok Kumar Das, Mohammad Wazid, Joel J. P. C. Rodrigues, Youngho Park“...Internet of Vehicles (IoV) is treated as an extension of Vehicle-to-Vehicle (V2V) communication...”
Published 2020-01-01
Get full text
Article -
2by Mohammad Wazid, Ashok Kumar Das, Joel J. P. C. Rodrigues, Sachin Shetty, Youngho Park“...The advancement in Information and Communications Technology (ICT) has changed the entire paradigm...”
Published 2019-01-01
Get full text
Article -
3by Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Youngho Park“..., as an important facet of IoT, has gained its focus for smart intelligent systems. As users communicate with smart...”
Published 2020-02-01
Get full text
Article -
4by Ashok Kumar Das, Mohammad Wazid, Animi Reddy Yannam, Joel J. P. C. Rodrigues, Youngho Park“...For secure communication between any two neighboring sensing devices on the Internet of Things (IoT...”
Published 2019-01-01
Get full text
Article -
5by Vanga Odelu, Ashok Kumar Das, Kim-Kwang Raymond Choo, Neeraj Kumar, Youngho Park“... the need for security and privacy without incurring additional communication and computation costs...”
Published 2017-01-01
Get full text
Article -
6by Neha Garg, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh, Joel J. P. C. Rodrigues, Youngho Park“... machine-to-machine communication and link to the cloud platforms for data storage. IoMT has the ability...”
Published 2020-01-01
Get full text
Article -
7by Sumit Pundir, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues, Youngho Park“... in Information and Communications Technology (ICT). Because of this advancement, new computing and communication...”
Published 2020-01-01
Get full text
Article -
8“...With the increasing use of mobile devices, a secure communication and key exchange become...”
Get full text
Article -
9by Ashok Kumar Das, Basudeb Bera, Mohammad Wazid, Sajjad Shaukat Jamal, Youngho Park“...In recent years, the Internet of things (IoT) has become an encouraging communication paradigm...”
Published 2021-01-01
Get full text
Article -
10by Subhas Barman, Ashok Kumar Das, Debasis Samanta, Samiran Chattopadhyay, Joel J. P. C. Rodrigues, Youngho Park“... the legitimacy of an authorized user over an insecure communication channel. Most of the existing authentication...”
Published 2018-01-01
Get full text
Article -
11by Santanu Chatterjee, Sandip Roy, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Alavalapati Goutham Reddy, Kisung Park, Youngho Park“... are involved. In TMIS, users generally communicate via public channels. Hence, authentication is essential...”
Published 2017-01-01
Get full text
Article -
12“.... However, the communication among vehicles is susceptible to various security threats because the sensitive...”
Get full text
Article -
13by Sumit Pundir, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues, Youngho Park“... and ruin the whole functioning of the communication. The sinkhole attacker nodes (<inline-formula> <math...”
Published 2020-02-01
Get full text
Article -
14by Ashok Kumar Das, Basudeb Bera, Mohammad Wazid, Sajjad Shaukat Jamal, Youngho Park“...Due to wide-spread use of the Information and Communications Technology (ICT) and Internet...”
Published 2021-01-01
Get full text
Article -
15by Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Joel J. P. C. Rodrigues, Youngho Park“... scheme outperforms other existing related schemes in terms of computation and communication costs...”
Published 2019-01-01
Get full text
Article -
16by Kisung Park, Sungkee Noh, Hyunjin Lee, Ashok Kumar Das, Myeonghyun Kim, Youngho Park, Mohammad Wazid“... to protect user privacy and achieve secure communication. A lightweight mutual authentication and key...”
Published 2020-01-01
Get full text
Article -
17by Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Vanga Odelu, Alavalapati Goutham Reddy, Kisung Park, Youngho Park“... between roadside units for their secure communications. The rigorous formal and informal security analysis...”
Published 2017-01-01
Get full text
Article -
18“...A secure authentication protocol plays a crucial role in securing communications over wireless...”
Get full text
Article