UAV computing-assisted search and rescue mission framework for disaster and harsh environment mitigation SH Alsamhi, AV Shvetsov, S Kumar, SV Shvetsova, MA Alhartomi, ... Drones 6 (7), 154, 2022 | 130 | 2022 |
Provably secure and fast color image encryption algorithm based on s-boxes and hyperchaotic map ZA Abduljabbar, IQ Abduljaleel, J Ma, MA Al Sibahee, VO Nyangaresi, ... IEEE Access 10, 26257-26270, 2022 | 69 | 2022 |
Trusted authority based session key agreement and authentication algorithm for smart grid networks VO Nyangaresi, M Abd‐Elnaby, MMA Eid, A Nabih Zaki Rashed Transactions on Emerging Telecommunications Technologies 33 (9), e4528, 2022 | 54 | 2022 |
Privacy preserving three-factor authentication protocol for secure message forwarding in wireless body area networks VO Nyangaresi Ad Hoc Networks 142, 103117, 2023 | 50 | 2023 |
ECC based authentication scheme for smart homes VO Nyangaresi 2021 International Symposium ELMAR, 5-10, 2021 | 49 | 2021 |
Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography VO Nyangaresi Journal of Systems Architecture 133, 102763, 2022 | 48 | 2022 |
QAM receiver based on light amplifiers measured with effective role of optical coherent duobinary transmitter MMA Eid, R Arunachalam, V Sorathiya, S Lavadiya, SK Patel, J Parmar, ... Journal of Optical Communications, 2022 | 48 | 2022 |
Efficient PUF based authentication protocol for internet of drones VO Nyangaresi, N Petrovic 2021 International Telecommunications Conference (ITC-Egypt), 1-4, 2021 | 43 | 2021 |
Terminal independent security token derivation scheme for ultra-dense IoT networks VO Nyangaresi Array 15, 100210, 2022 | 41 | 2022 |
Efficient group authentication protocol for secure 5G enabled vehicular communications VO Nyangaresi, AJ Rodrigues, SO Abeka 2020 16th International Computer Engineering Conference (ICENCO), 25-30, 2020 | 41 | 2020 |
Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things VO Nyangaresi, M Ahmad, A Alkhayyat, W Feng Expert Systems 39 (10), e13126, 2022 | 40 | 2022 |
Provably secure protocol for 5G HetNets VO Nyangaresi 2021 IEEE International Conference on Microwaves, Antennas, Communications …, 2021 | 39 | 2021 |
Spatial single mode laser source interaction with measured pulse based parabolic index multimode fiber ANZ Rashed, SKH Ahammad, MG Daher, V Sorathiya, A Siddique, ... Journal of Optical Communications, 2022 | 38 | 2022 |
Neuro-fuzzy based handover authentication protocol for ultra dense 5G networks VO Nyangaresi, AJ Rodrigues, SO Abeka 2020 2nd Global Power, Energy and Communication Conference (GPECOM), 339-344, 2020 | 35 | 2020 |
Session Key Agreement Protocol for Secure D2D Communication VO Nyangaresi, Z Mohammad The Fifth International Conference on Safety and Security with IoT: SaSeIoT …, 2022 | 34 | 2022 |
Audio steganography with enhanced LSB method for securing encrypted text with bit cycling EW Abood, AM Abdullah, MA Al Sibahe, ZA Abduljabbar, VO Nyangaresi, ... Bulletin of Electrical Engineering and Informatics 11 (1), 185-194, 2022 | 34 | 2022 |
Efficient handover protocol for 5G and beyond networks VO Nyangaresi, AJ Rodrigues Computers & Security 113, 102546, 2022 | 34 | 2022 |
Provably Secure Pseudonyms based Authentication Protocol for Wearable Ubiquitous Computing Environment VO Nyangaresi 2022 International Conference on Inventive Computation Technologies (ICICT), 1-6, 2022 | 33 | 2022 |
A formally validated authentication algorithm for secure message forwarding in smart home networks VO Nyangaresi SN Computer Science 3 (5), 364, 2022 | 33 | 2022 |
A formally verified message validation protocol for intelligent IoT E-health systems VO Nyangaresi, J Ma 2022 IEEE World Conference on Applied Intelligence and Computing (AIC), 416-422, 2022 | 33 | 2022 |