Ismaila Adeniyi Kamil

Orcid: 0000-0002-1939-0219

According to our database1, Ismaila Adeniyi Kamil authored at least 21 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
An integrated Fuzzy-BWM, Fuzzy-LBWA and V-Fuzzy-CoCoSo-LD model for gateway selection in fog-bolstered Internet of Things.
Appl. Soft Comput., August, 2023

Optimal fog node selection based on hybrid particle swarm optimization and firefly algorithm in dynamic fog computing services.
Eng. Appl. Artif. Intell., May, 2023

2022
Secure and privacy-preserving D2D communication in fog computing services.
Comput. Networks, 2022

2021
An efficient authentication scheme with strong privacy preservation for fog-assisted vehicular ad hoc networks based on blockchain and neuro-fuzzy.
Veh. Commun., 2021

Optimization techniques and applications in fog computing: An exhaustive survey.
Swarm Evol. Comput., 2021

PAASH: A privacy-preserving authentication and fine-grained access control of outsourced data for secure smart health in smart cities.
J. Parallel Distributed Comput., 2021

EPDAS: Efficient privacy-preserving data analysis scheme for smart grid network.
J. King Saud Univ. Comput. Inf. Sci., 2021

A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for LTE-V-based internet of vehicles in smart cities.
J. Inf. Secur. Appl., 2021

A trust management system for fog computing services.
Internet Things, 2021

A provably secure lightweight certificateless aggregate signature scheme for healthcare wireless sensor network.
Int. J. Inf. Comput. Secur., 2021

A lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment.
Comput. Commun., 2021

A Lightweight Authentication and Key Agreement Protocol for Secure Fog-to-Fog Collaboration.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021

2020
On the security of privacy-preserving authentication scheme with full aggregation in vehicular ad hoc network.
Secur. Priv., 2020

A Fuzzy-AHP based prioritization of trust criteria in fog computing services.
Appl. Soft Comput., 2020

2019
An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks.
J. Inf. Secur. Appl., 2019

Lightweight privacy-preserving power injection and communication over vehicular networks and 5G smart grid slice with provable security.
Internet Things, 2019

A Privacy-Aware Data Aggregation Scheme for Smart Grid Based on Elliptic Curve Cryptography With Provable Security Against Internal Attacks.
Int. J. Inf. Secur. Priv., 2019

MAP: efficient cooperation induced routing scheme for a delay tolerant multi-hop mobile network.
Int. J. Ad Hoc Ubiquitous Comput., 2019

A lightweight CLAS scheme with complete aggregation for healthcare mobile crowdsensing.
Comput. Commun., 2019

2018
Makeup-Invariant Face Recognition using combined Gabor Filter Bank and Histogram of Oriented Gradients.
Proceedings of the 2nd International Conference on Advances in Image Processing, 2018

2017
A secure and privacy-preserving lightweight authentication protocol for wireless communications.
Inf. Secur. J. A Glob. Perspect., 2017


  Loading...