Search Results - "Islam, K S"
-
1
Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF
Published in IEEE transactions on vehicular technology (01-11-2021)“…The concept of the smart city and the extensive use of vehicles are evolving progressively. This evolution makes vehicular ad-hoc network (VANET) a widely used…”
Get full text
Journal Article -
2
A pairing-free and provably secure certificateless signature scheme
Published in Information sciences (01-06-2018)“…Certificateless Signature (CLS) scheme is a notable cryptographic technique for solving the key escrow problem in identity-based cryptosystem (IBC). In the…”
Get full text
Journal Article -
3
A novel machine learning based feature selection for motor imagery EEG signal classification in Internet of medical things environment
Published in Future generation computer systems (01-09-2019)“…In Internet of Medical Things (IoMT) environment, feature selection is an efficient way of identifying the most discriminant health-related features from the…”
Get full text
Journal Article -
4
Risk of multi-drug resistant Campylobacter spp. and residual antimicrobials at poultry farms and live bird markets in Bangladesh
Published in BMC infectious diseases (15-04-2020)“…Understanding potential risks of multi-drug resistant (MDR) pathogens from the booming poultry sector is a crucial public health concern. Campylobacter spp…”
Get full text
Journal Article -
5
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments
Published in Multimedia tools and applications (2018)“…An authentication scheme handling multiple servers offers a feasible environment to users to conveniently access the rightful services from various servers…”
Get full text
Journal Article -
6
Higher Fertilizer Inputs Increase Fitness Traits of Brown Planthopper in Rice
Published in Scientific reports (05-07-2017)“…Rice ( Oryza sativa L.) is the primary staple food source for more than half of the world’s population. In many developing countries, increased use of…”
Get full text
Journal Article -
7
Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems
Published in Journal of medical systems (01-10-2014)“…Recently, many authentication protocols have been presented using smartcard for the telecare medicine information system (TMIS). In 2014, Xu et al. put forward…”
Get full text
Journal Article -
8
Bovine tuberculosis prevalence and risk factors in selected districts of Bangladesh
Published in PloS one (10-11-2020)“…A cross-sectional survey was conducted in selected districts of Bangladesh to estimate the prevalence of bovine tuberculosis (bTB), and to identify the risk…”
Get full text
Journal Article -
9
IoT-RRHM: Provably secure IoT-based real-time remote healthcare monitoring framework
Published in Journal of systems architecture (01-05-2023)“…We have designed an IoT-based real-time remote healthcare monitoring (IoT-RRHM) framework to monitor the healthcare conditions of a patient who lives in a…”
Get full text
Journal Article -
10
Security Analysis and Improvement of 'a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System'
Published in PloS one (11-08-2015)“…Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems…”
Get full text
Journal Article -
11
A robust mutual authentication protocol for WSN with multiple base-stations
Published in Ad hoc networks (01-06-2018)“…•We presented an efficient multiple base-stations based user authentication protocol for WSN.•We evaluated all the known security properties of our protocol…”
Get full text
Journal Article -
12
An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography
Published in Journal of medical systems (01-11-2015)“…In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System,…”
Get full text
Journal Article -
13
Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems
Published in Journal of medical systems (01-11-2015)“…The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote…”
Get full text
Journal Article -
14
Design of improved password authentication and update scheme based on elliptic curve cryptography
Published in Mathematical and computer modelling (01-06-2013)“…Secured password authentication and update of passwords are two essential requirements for remote login over unreliable networks. In this paper, an elliptic…”
Get full text
Journal Article -
15
Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments
Published in IEEE internet of things journal (01-08-2018)“…Nowadays, the Internet of Things (IoT) and cloud computing have become more pervasive in the context of the industry as digitization becomes a business…”
Get full text
Journal Article -
16
Catalytic Purification of Sulfur from Bituminous Impurity
Published in Pakistan journal of analytical and environmental chemistry (31-12-2023)“…The aim of this study is to build a pilot plant system working in a continuous mode to purify sulfur from bituminous impurities. This study focused on the role…”
Get full text
Journal Article -
17
A survey on security and cryptographic perspective of Industrial-Internet-of-Things
Published in Internet of things (Amsterdam. Online) (01-04-2024)“…The Industrial-Internet-of-Things (IIoT) powers several applications in the modern world: smart city, smart grid, smart manufacturing, smart logistics…”
Get full text
Journal Article -
18
A secure blockchain-based group key agreement protocol for IoT
Published in The Journal of supercomputing (01-08-2021)“…Since most Internet of things (IoT) devices are energy-limited, increasingly more manufacturers have chosen to develop IoT applications based on group…”
Get full text
Journal Article -
19
Association between diabetic peripheral neuropathy and heart rate variability in subjects with type 2 diabetes
Published in Diabetes research and clinical practice (01-06-2018)“…This study evaluated the association of Heart rate variability (HRV) measurements with diabetic peripheral neuropathy (DPN) in patients with type 2 diabetes…”
Get full text
Journal Article -
20
Fascioliasis risk factors and space-time clusters in domestic ruminants in Bangladesh
Published in Parasites & vectors (08-05-2017)“…A retrospective observational study was conducted to identify fascioliasis hotspots, clusters, potential risk factors and to map fascioliasis risk in domestic…”
Get full text
Journal Article