Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
A Privacy Preserving
Authentication Mechanism for
Secure Fog Network Formation
by Bilal Bokhari
% 45
SIMILARITY INDEX
% 26
INTERNET SOURCES
% 39
PUBLICATIONS
% 24
STUDENT PAPERS
PRIMARY SOURCES
1
link.springer.com
Internet Source % 10
2
pdfs.semanticscholar.org
Internet Source %4
3
Arij Ben Amor, Mohamed Abid, Aref Meddeb. "A
Privacy-Preserving Authentication Scheme in an
%4
Edge-Fog Environment", 2017 IEEE/ACS 14th
International Conference on Computer Systems
and Applications (AICCSA), 2017
Publication
4
ijns.jalaxy.com.tw
Internet Source %4
5
Jing Wang, Libing Wu, Kim-Kwang Raymond
Choo, Debiao He. "Blockchain Based
%3
Anonymous Authentication with Key
Management for Smart Grid Edge Computing
Infrastructure", IEEE Transactions on Industrial
Informatics, 2019
Publication
Kashif Munir, Lawan A. Mohammed. "chapter 6
6
Comparing User Authentication Techniques for 3
%
Fog Computing", IGI Global, 2019
Publication
7
Fei Wang, Yongjun Xu, Liehuang Zhu, Xiaojiang
Du, Mohsen Guizani. "LAMANCO: A Lightweight
3
%
Anonymous Mutual Authentication Scheme for
$N$ -Times Computing Offloading in IoT", IEEE
Internet of Things Journal, 2019
Publication
8
Submitted to Higher Education Commission
Pakistan
2
%
Student Paper
9
linknovate.com
Internet Source 1
%
10
Submitted to University of Johannsburg
Student Paper 1
%
11
Youcef Imine, Djamel Eddine Kouicem,
Abdelmadjid Bouabdallah, Lounis Ahmed.
1
%
"MASFOG: An Efficient Mutual Authentication
Scheme for Fog Computing Architecture", 2018
17th IEEE International Conference On Trust,
Security And Privacy In Computing And
Communications/ 12th IEEE International
Conference On Big Data Science And
Engineering (TrustCom/BigDataSE), 2018
Publication
12
Prosanta Gope. "LAAP: Lightweight anonymous
authentication protocol for D2D-Aided fog
1
%
computing paradigm", Computers & Security,
2019
Publication
13
Mohammad Wazid, Ashok Kumar Das, Neeraj
Kumar, Athanasios V. Vasilakos. "Design of
1
%
secure key management and user
authentication scheme for fog computing
services", Future Generation Computer
Systems, 2019
Publication
14
Mohammad Wazid, Ashok Kumar Das, Saru
Kumari, Xiong Li, Fan Wu. "Provably secure
1
%
biometric-based user authentication and key
agreement scheme in cloud computing",
Security and Communication Networks, 2016
Publication
15
shivindia-ghana.edu.gh
Internet Source 1
%
16
Submitted to College of Engineering Trivandrum
Student Paper 1
%
17
Mithun Mukherjee, Rakesh Matam, Lei Shu,
Leandros Maglaras, Mohamed Amine Ferrag,
1
%
Nikumani Choudhury, Vikas Kumar. "Security
and Privacy in Fog Computing: Challenges",
IEEE Access, 2017
Publication
18
dspace.cc.tut.fi
Internet Source <%1
19
ieeexplore.ieee.org
Internet Source <%1
20
Mohammad Wazid, Ashok Kumar Das, Saru
Kumari, Xiong Li, Fan Wu. "Design of an
<%1
efficient and provably secure anonymity
preserving three-factor user authentication and
key agreement scheme for TMIS", Security and
Communication Networks, 2016
Publication
21
Durbadal Chattaraj, Monalisa Sarma, Ashok
Kumar Das, Neeraj Kumar, Joel J. P. C.
<%1
Rodrigues, Youngho Park. "HEAP: An Efficient
and Fault-tolerant Authentication and Key
Exchange Protocol for Hadoop-assisted Big
Data Platform", IEEE Access, 2018
Publication
22
Submitted to Harrisburg University of Science
and Technology
<%1
Student Paper
23
Submitted to South Dakota Board of Regents
Student Paper <%1
24
Submitted to University of Northumbria at
Newcastle
<%1
Student Paper
25
"Wireless Algorithms, Systems, and
Applications", Springer Nature, 2015
<%1
Publication
26
Freeman, Harvey, and Tao Zhang. "The
emerging era of fog computing and networking
<%1
[The President's Page]", IEEE Communications
Magazine, 2016.
Publication