Vanga Odelu
Orcid: 0000-0001-6903-0361
According to our database1,
Vanga Odelu
authored at least 71 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Cyber Secur. Appl., 2024
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024
2023
Fog-Based Single Sign-On Authentication Protocol for Electronic Healthcare Applications.
IEEE Internet Things J., 2023
Comment on "Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud".
CoRR, 2023
IIDS: Design of Intelligent Intrusion Detection System for Internet-of-Things Applications.
CoRR, 2023
2022
A survey on security challenges and protocols of electric vehicle dynamic charging system.
Secur. Priv., 2022
Comparative Study of HDL algorithms for Intrusion Detection System in Internet of Vehicles.
IACR Cryptol. ePrint Arch., 2022
Provably Secure Pseudo-Identity Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Lightweight Mobile Devices.
IEEE Access, 2022
Analysis of A Lightweight Authentication Protocol for Remote Surgery Applications under the CK - Adversary Model.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022
Security Analysis of a Key Exchange Protocol under Dolev-Yao Threat Model Using Tamarin Prover.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022
2021
IACR Cryptol. ePrint Arch., 2021
2020
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment.
IEEE Trans. Dependable Secur. Comput., 2020
An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments.
Sensors, 2020
Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment.
J. Inf. Secur. Appl., 2020
2019
A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment.
J. Ambient Intell. Humaniz. Comput., 2019
A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment.
IEEE Internet Things J., 2019
Efficient privacy preserving device authentication in WBANs for industrial e-health applications.
Comput. Secur., 2019
Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions.
IEEE Access, 2019
Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019
On the Design of a Secure Anonymous User Authentication Scheme for Multiple Base Stations Based Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019
An Efficient Two-Server Password-only User Authentication for Consumer Electronic Devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019
Proceedings of the Blockchain and Applications - International Congress, 2019
2018
IEEE Trans. Smart Grid, 2018
A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks.
Telecommun. Syst., 2018
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks.
IEEE Internet Things J., 2018
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks.
Comput. Electr. Eng., 2018
Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks.
IEEE Access, 2018
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
Proceedings of the Mining Intelligence and Knowledge Exploration, 2018
2017
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017
A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks.
Wirel. Pers. Commun., 2017
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services.
Future Gener. Comput. Syst., 2017
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment.
Comput. Stand. Interfaces, 2017
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks.
IEEE Access, 2017
Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts.
IEEE Access, 2017
Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices.
IEEE Access, 2017
Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment.
IEEE Access, 2017
2016
SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms.
IEEE Trans. Consumer Electron., 2016
Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography.
Secur. Commun. Networks, 2016
An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks.
Secur. Commun. Networks, 2016
Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks.
Secur. Commun. Networks, 2016
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.
Secur. Commun. Networks, 2016
Provably secure user authentication and key agreement scheme for wireless sensor networks.
Secur. Commun. Networks, 2016
Provably secure three-factor authentication and key agreement scheme for session initiation protocol.
Secur. Commun. Networks, 2016
A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system.
J. King Saud Univ. Comput. Inf. Sci., 2016
KSII Trans. Internet Inf. Syst., 2016
A secure and efficient time-bound hierarchical access control scheme for secure broadcasting.
Int. J. Ad Hoc Ubiquitous Comput., 2016
Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.
Comput. Methods Programs Biomed., 2016
Secure anonymous mutual authentication for star two-tier wireless body area networks.
Comput. Methods Programs Biomed., 2016
2015
Wirel. Pers. Commun., 2015
An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems.
Wirel. Pers. Commun., 2015
DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks.
Wirel. Pers. Commun., 2015
IEEE Trans. Inf. Forensics Secur., 2015
An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards.
Secur. Commun. Networks, 2015
A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks.
Secur. Commun. Networks, 2015
A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.
J. Medical Syst., 2015
An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card.
J. Inf. Secur. Appl., 2015
An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices.
IACR Cryptol. ePrint Arch., 2015
2014
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy.
Inf. Sci., 2014
An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function.
Int. J. Commun. Networks Distributed Syst., 2014
Cryptanalysis on 'Robust Biometrics-Based Authentication Scheme for Multi-server Environment'.
IACR Cryptol. ePrint Arch., 2014
Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications, 2014
2013
Smart Comput. Rev., 2013
An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System.
J. Medical Syst., 2013
A novel linear polynomial-based dynamic key management scheme for hierarchical access control.
Int. J. Trust. Manag. Comput. Commun., 2013
Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function.
Proceedings of the Security in Computing and Communications - International Symposium, 2013
LHSC: An effective dynamic key management scheme for linear hierarchical access control.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013
2012
A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012