UAV computing-assisted search and rescue mission framework for disaster and harsh environment mitigation SH Alsamhi, AV Shvetsov, S Kumar, SV Shvetsova, MA Alhartomi, ... Drones 6 (7), 154, 2022 | 141 | 2022 |
Provably secure and fast color image encryption algorithm based on s-boxes and hyperchaotic map ZA Abduljabbar, IQ Abduljaleel, J Ma, MA Al Sibahee, VO Nyangaresi, ... IEEE Access 10, 26257-26270, 2022 | 71 | 2022 |
Privacy preserving three-factor authentication protocol for secure message forwarding in wireless body area networks VO Nyangaresi Ad Hoc Networks 142, 103117, 2023 | 57 | 2023 |
Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography VO Nyangaresi Journal of Systems Architecture 133, 102763, 2022 | 55 | 2022 |
Trusted authority based session key agreement and authentication algorithm for smart grid networks VO Nyangaresi, M Abd‐Elnaby, MMA Eid, A Nabih Zaki Rashed Transactions on Emerging Telecommunications Technologies 33 (9), e4528, 2022 | 55 | 2022 |
QAM receiver based on light amplifiers measured with effective role of optical coherent duobinary transmitter MMA Eid, R Arunachalam, V Sorathiya, S Lavadiya, SK Patel, J Parmar, ... Journal of Optical Communications, 2022 | 51 | 2022 |
ECC based authentication scheme for smart homes VO Nyangaresi 2021 International Symposium ELMAR, 5-10, 2021 | 50 | 2021 |
Efficient PUF based authentication protocol for internet of drones VO Nyangaresi, N Petrovic 2021 International Telecommunications Conference (ITC-Egypt), 1-4, 2021 | 44 | 2021 |
Efficient group authentication protocol for secure 5G enabled vehicular communications VO Nyangaresi, AJ Rodrigues, SO Abeka 2020 16th International Computer Engineering Conference (ICENCO), 25-30, 2020 | 43 | 2020 |
Terminal independent security token derivation scheme for ultra-dense IoT networks VO Nyangaresi Array 15, 100210, 2022 | 42 | 2022 |
Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things VO Nyangaresi, M Ahmad, A Alkhayyat, W Feng Expert Systems 39 (10), e13126, 2022 | 41 | 2022 |
Spatial single mode laser source interaction with measured pulse based parabolic index multimode fiber ANZ Rashed, SKH Ahammad, MG Daher, V Sorathiya, A Siddique, ... Journal of Optical Communications, 2022 | 41 | 2022 |
Provably secure protocol for 5G HetNets VO Nyangaresi 2021 IEEE International Conference on Microwaves, Antennas, Communications …, 2021 | 39 | 2021 |
Session Key Agreement Protocol for Secure D2D Communication VO Nyangaresi, Z Mohammad The Fifth International Conference on Safety and Security with IoT: SaSeIoT …, 2022 | 38 | 2022 |
Audio steganography with enhanced LSB method for securing encrypted text with bit cycling EW Abood, AM Abdullah, MA Al Sibahe, ZA Abduljabbar, VO Nyangaresi, ... Bulletin of Electrical Engineering and Informatics 11 (1), 185-194, 2022 | 37 | 2022 |
Efficient handover protocol for 5G and beyond networks VO Nyangaresi, AJ Rodrigues Computers & Security 113, 102546, 2022 | 36 | 2022 |
Neuro-fuzzy based handover authentication protocol for ultra dense 5G networks VO Nyangaresi, AJ Rodrigues, SO Abeka 2020 2nd Global Power, Energy and Communication Conference (GPECOM), 339-344, 2020 | 36 | 2020 |
Provably Secure Pseudonyms based Authentication Protocol for Wearable Ubiquitous Computing Environment VO Nyangaresi 2022 International Conference on Inventive Computation Technologies (ICICT), 1-6, 2022 | 35 | 2022 |
A formally verified message validation protocol for intelligent IoT E-health systems VO Nyangaresi, J Ma 2022 IEEE World Conference on Applied Intelligence and Computing (AIC), 416-422, 2022 | 35 | 2022 |
Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things MA Al Sibahee, VO Nyangaresi, J Ma, ZA Abduljabbar International Conference on Internet of Things as a Service, 3-18, 2021 | 35 | 2021 |