Citation Impact
Citing Papers
Intercrossed Access Controls for Secure Financial Services on Multimedia Big Data in Cloud Systems
2016
Diagnostic accuracy of deep learning in medical imaging: a systematic review and meta-analysis
2021 Standout
A Secure Authentication Scheme for Telecare Medicine Information Systems
2010 Standout
A More Secure Authentication Scheme for Telecare Medicine Information Systems
2011 Standout
Application of deep learning–based computer-aided detection system: detecting pneumothorax on chest radiograph after biopsy
2019
Deep Learning: A Comprehensive Overview on Techniques, Taxonomy, Applications and Research Directions
2021 Standout
Machine Learning: Algorithms, Real-World Applications and Research Directions
2021 Standout
Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System
2013
A user friendly remote authentication scheme with smart cards
2003
An Efficient and Practical Solution to Remote Authentication: Smart Card
2002
Improved remote authentication scheme with smart card
2004
A Systematic Literature Review on Online Medical Services in Malaysia
2020 Standout
Deep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective
2021
Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems
2014
Time‐bound key‐aggregate encryption for cloud storage
2016
Establishing Trusted Identities in Disconnected Edge Environments
2016
A survey on FinTech
2017 Standout
More secure remote user authentication scheme
2008
Blockchain-Secured Smart Manufacturing in Industry 4.0: A Survey
2021
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
2008
Wireless Networks With RF Energy Harvesting: A Contemporary Survey
2014 Standout
Survivable RFID Systems: Issues, Challenges, and Techniques
2010
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
2017 Standout
Dynamic ID-based remote user password authentication schemes using smart cards: A review
2012
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
2006
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
2004
Security, privacy and trust in Internet of Things: The road ahead
2014 Standout
A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN
2020 Standout
Privacy preserving smartcard-based authentication system with provable security
2015
Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication
2019
An Efficient Privacy-Friendly Hop-by-Hop Data Aggregation Scheme for Smart Grids
2019
An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication
2019 Standout
Security enhancement on an improvement on two remote user authentication schemes using smart cards
2010
Two robust remote user authentication protocols using smart cards
2010
On Binary Decomposition Based Privacy-Preserving Aggregation Schemes in Real-Time Monitoring Systems
2016
Ensemble Classifiers for Steganalysis of Digital Media
2011 Standout
Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey
2017
A Survey on the Edge Computing for the Internet of Things
2017 Standout
Rich Models for Steganalysis of Digital Images
2012 Standout
Early fire detection using convolutional neural networks during surveillance for effective disaster management
2017 Standout
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
2016 Standout
Cryptanalysis of simple three-party key exchange protocol
2008
Efficient Deep CNN-Based Fire Detection and Localization in Video Surveillance Applications
2018 Standout
WebTag: Web Browsing into Sensor Tags over NFC
2012
20 years of Electronic Commerce Research
2021 Standout
Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems
2013
Acceptance of mobile banking in Islamic banks: evidence from modified UTAUT model
2018 Standout
Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology
2020 Standout
A Robust Remote User Authentication Scheme Using Smart Card
2011
Design of improved password authentication and update scheme based on elliptic curve cryptography
2011
Improvement of Chien et al.'s remote user authentication scheme using smart cards
2004
Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’
2010
Enhanced password-based simple three-party key exchange protocol
2008
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
2019 Standout
Image steganography using uncorrelated color space and its application for security of visual contents in online social networks
2016
Cryptanalysis of a flexible remote user authentication scheme using smart cards
2005
Edge Adaptive Image Steganography Based on LSB Matching Revisited
2010
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
2014
Overview and Evaluation of Bluetooth Low Energy: An Emerging Low-Power Wireless Technology
2012 Standout
Robust remote authentication scheme with smart cards
2005
A survey on blockchain technology and its security
2022 Standout
The importance of proofs of security for key establishment protocols
2005
Digital image steganography: Survey and analysis of current methods
2009 Standout
Novel Anonymous Authentication Scheme Using Smart Cards
2012
The Impact of Artificial Intelligence and Blockchain on the Accounting Profession
2020 Standout
Privacy and Authentication Protocol for Mobile RFID Systems
2014
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
2015
A password authentication scheme over insecure networks
2005
Multilayer Consensus ECC-Based Password Authenticated Key-Exchange (MCEPAK) Protocol for Smart Grid System
2013
ECC-based untraceable authentication for large-scale active-tag RFID systems
2014
Works of Hung–Min Sun being referenced
Attacks and Solutions on Strong-Password Authentication
2001
Further cryptanalysis of a password authentication scheme with smart cards
2003
Provably Secure Three-Party Password-Authenticated Key Exchange
2004
An Efficient Remote User Authentication Scheme Using Smart Cards
2000
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems
2008
A provable authenticated group key agreement protocol for mobile environment
2015
On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme
2009
Effective Pneumothorax Detection for Chest X-Ray Images Using Local Binary Pattern and Support Vector Machine
2018
A Gen2-Based RFID Authentication Protocol for Security and Privacy
2009
A novel mutual authentication scheme based on quadratic residues for RFID systems
2008
A Blockchain-Based Application System for Product Anti-Counterfeiting
2020
On the Security of Some Password Authentication Protocols
2003
On the Security of Chien's Ultralightweight RFID Authentication Protocol
2009
oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks
2011
Secure key agreement protocols for three-party against guessing attacks
2004
Password authenticated key exchange protocols among diverse network domains
2005
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks
2011
Simple authenticated key agreement protocol resistant to password guessing attacks
2002
Three-party encrypted key exchange without server public-keys
2001
Security analysis of the generalized key agreement and password authentication protocol
2001
SPATE: Small-Group PKI-Less Authenticated Trust Establishment
2010
An efficient remote use authentication scheme using smart cards
2000
DeepBot: a time-based botnet detection with deep learning
2020
Practical RSA signature scheme based on periodical rekeying for wireless sensor networks
2012
Three-party encrypted key exchange
2000