Follow
Muzzammil Hussain
Title
Cited by
Cited by
Year
Security analysis of TLS authentication
AK Ranjan, V Kumar, M Hussain
2014 International conference on contemporary computing and informatics …, 2014
222014
Secure communication for advance metering infrastructure in smart grid
V Kumar, M Hussain
2014 Annual IEEE India Conference (INDICON), 1-6, 2014
212014
Simple, secure, efficient, lightweight and token based protocol for mutual authentication in wireless sensor networks
R Rathore, M Hussain
Emerging Research in Computing, Information, Communication and Applications …, 2015
192015
Simple, secure, and lightweight mechanism for mutual authentication of nodes in tiny wireless sensor networks
U Jain, M Hussain, J Kakarla
International Journal of Communication Systems 33 (9), e4384, 2020
152020
Securing wireless sensors in military applications through resilient authentication mechanism
U Jain, M Hussain
Procedia Computer Science 171, 719-728, 2020
152020
Framework for privacy preservation in iot through classification and access control mechanisms
N Kaliya, M Hussain
2017 2nd International Conference for Convergence in Technology (I2CT), 430-434, 2017
152017
Progress in advanced computing and intelligent engineering
B Pati, CR Panigrahi, S Misra, AK Pujari, S Bakshi
Advances in Intelligent Systems and Computing 713, 2017
142017
Terminal authentication in M2M communications in the context of internet of things
AK Ranjan, M Hussain
Procedia Computer Science 89, 34-42, 2016
142016
Simple and secure device authentication mechanism for smart environments using Internet of things devices
M Hussain, U Jain
International Journal of Communication Systems 33 (16), e4570, 2020
132020
Mitigating primary user emulation attack in cognitive radio network using localization and variance detection
R Sultana, M Hussain
Proceedings of First International Conference on Smart System, Innovations …, 2018
132018
Mitigating replay attack in wireless sensor network through assortment of packets
V Sharma, M Hussain
Proceedings of the First International Conference on Computational …, 2017
122017
An improvised framework for privacy preservation in IoT
M Hussain, N Kaliya
Research Anthology on Privatizing and Securing Data, 475-491, 2021
112021
Secure session key sharing using symmetric key cryptography
S Arora, M Hussain
2018 International Conference on Advances in Computing, Communications and …, 2018
112018
A secure AODV routing protocol with node authentication
P Yadav, M Hussain
2017 International conference of Electronics, Communication and Aerospace …, 2017
112017
Wireless sensor networks: Attacks and countermeasures
U Jain, M Hussain
proceedings of 3rd international conference on internet of things and …, 2018
92018
Security mechanism for maritime territory and frontier surveillance in naval operations using wireless sensor networks
U Jain, M Hussain
Concurrency and Computation: Practice and Experience 33 (17), e6300, 2021
82021
Simple and secure node authentication in wireless sensor networks
A Vardhan, M Hussain, RM Garimella
2016 International Conference on Recent Advances and Innovations in …, 2016
82016
Node authentication in WSN using key distribution mechanism
V Sharma, M Hussasin
2016 International Conference on ICT in Business Industry & Government …, 2016
82016
Security analysis of cloud storage with access control and file assured deletion (FADE)
AK Ranjan, V Kumar, M Hussain
2015 Second International Conference on Advances in Computing and …, 2015
82015
Lightweight, secure, efficient, and dynamic scheme for mutual authentication of devices in Internet‐of‐Things‐Fog environment
U Jain, S Pirasteh, M Hussain
Concurrency and Computation: Practice and Experience 35 (1), e7428, 2023
72023
The system can't perform the operation now. Try again later.
Articles 1–20