-
1Academic Journal
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
-
2Academic Journal
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
-
3Academic Journal
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
-
4
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
-
5Image
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
-
6Image
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
-
7
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
-
8
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
-
9
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
-
10Image
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
-
11Image
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
-
12Image
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
-
13
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
-
14
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
-
15
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
-
16
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
-
17
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
Relation: https://figshare.com/articles/dataset/Comparison_analysis_in_terms_of_security_features_/25113838
-
18
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
Relation: https://figshare.com/articles/dataset/Comparison_analysis_in_terms_of_communication_costs_/25113835
-
19
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services
-
20
المؤلفون: Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
مصطلحات موضوعية: Science Policy, Environmental Sciences not elsewhere classified, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, protocols either suffer, fuzzy extractor method, four round trips, elliptic curve cryptography, disturbance severely threatens, access sensitive information, robust security method, minimal operational costs, robust authentication scheme, numerous security mechanisms, proposed security mechanism, enabled healthcare system, public cloud server, numerous threats, security analysis, whole system, reliable system, computation costs, work uses, various applications, upon comparing, replay attacks, proposed protocol, prior work, past decades, offers services