Security analysis of TLS authentication AK Ranjan, V Kumar, M Hussain 2014 International conference on contemporary computing and informatics …, 2014 | 22 | 2014 |
Secure communication for advance metering infrastructure in smart grid V Kumar, M Hussain 2014 Annual IEEE India Conference (INDICON), 1-6, 2014 | 21 | 2014 |
Simple, secure, efficient, lightweight and token based protocol for mutual authentication in wireless sensor networks R Rathore, M Hussain Emerging Research in Computing, Information, Communication and Applications …, 2015 | 19 | 2015 |
Simple, secure, and lightweight mechanism for mutual authentication of nodes in tiny wireless sensor networks U Jain, M Hussain, J Kakarla International Journal of Communication Systems 33 (9), e4384, 2020 | 15 | 2020 |
Securing wireless sensors in military applications through resilient authentication mechanism U Jain, M Hussain Procedia Computer Science 171, 719-728, 2020 | 15 | 2020 |
Framework for privacy preservation in iot through classification and access control mechanisms N Kaliya, M Hussain 2017 2nd International Conference for Convergence in Technology (I2CT), 430-434, 2017 | 15 | 2017 |
Progress in advanced computing and intelligent engineering B Pati, CR Panigrahi, S Misra, AK Pujari, S Bakshi Advances in Intelligent Systems and Computing 713, 2017 | 14 | 2017 |
Terminal authentication in M2M communications in the context of internet of things AK Ranjan, M Hussain Procedia Computer Science 89, 34-42, 2016 | 14 | 2016 |
Simple and secure device authentication mechanism for smart environments using Internet of things devices M Hussain, U Jain International Journal of Communication Systems 33 (16), e4570, 2020 | 13 | 2020 |
Mitigating primary user emulation attack in cognitive radio network using localization and variance detection R Sultana, M Hussain Proceedings of First International Conference on Smart System, Innovations …, 2018 | 13 | 2018 |
Mitigating replay attack in wireless sensor network through assortment of packets V Sharma, M Hussain Proceedings of the First International Conference on Computational …, 2017 | 12 | 2017 |
An improvised framework for privacy preservation in IoT M Hussain, N Kaliya Research Anthology on Privatizing and Securing Data, 475-491, 2021 | 11 | 2021 |
Secure session key sharing using symmetric key cryptography S Arora, M Hussain 2018 International Conference on Advances in Computing, Communications and …, 2018 | 11 | 2018 |
A secure AODV routing protocol with node authentication P Yadav, M Hussain 2017 International conference of Electronics, Communication and Aerospace …, 2017 | 11 | 2017 |
Wireless sensor networks: Attacks and countermeasures U Jain, M Hussain proceedings of 3rd international conference on internet of things and …, 2018 | 9 | 2018 |
Security mechanism for maritime territory and frontier surveillance in naval operations using wireless sensor networks U Jain, M Hussain Concurrency and Computation: Practice and Experience 33 (17), e6300, 2021 | 8 | 2021 |
Simple and secure node authentication in wireless sensor networks A Vardhan, M Hussain, RM Garimella 2016 International Conference on Recent Advances and Innovations in …, 2016 | 8 | 2016 |
Node authentication in WSN using key distribution mechanism V Sharma, M Hussasin 2016 International Conference on ICT in Business Industry & Government …, 2016 | 8 | 2016 |
Security analysis of cloud storage with access control and file assured deletion (FADE) AK Ranjan, V Kumar, M Hussain 2015 Second International Conference on Advances in Computing and …, 2015 | 8 | 2015 |
Lightweight, secure, efficient, and dynamic scheme for mutual authentication of devices in Internet‐of‐Things‐Fog environment U Jain, S Pirasteh, M Hussain Concurrency and Computation: Practice and Experience 35 (1), e7428, 2023 | 7 | 2023 |