34
Views
18
CrossRef citations to date
0
Altmetric
Articles

An enhanced 4-way technique using cookies for robust authentication process in wireless network

, , , , &

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (18)

S. Gnana Sanga Mithra & V. Vijayalaskmi. (2022) A mathematical model for breaching the blockades-mainstreaming transwomen and transmen in Chennai by using block fuzzy cognitive. Journal of Interdisciplinary Mathematics 25:3, pages 827-838.
Read now
Santosh Kumar, Neha Janu, Linesh Raja & Ankit Kumar. (2022) A fuzzy ISM analysis of factors in growth of initial coin offerings (ICOs). Journal of Interdisciplinary Mathematics 25:3, pages 815-825.
Read now
Osama R. Shahin, Rasha M. Abd El-Aziz & Ahmed I. Taloba. (2022) Detection and classification of Covid-19 in CT-lungs screening using machine learning techniques. Journal of Interdisciplinary Mathematics 25:3, pages 791-813.
Read now
Anjali Meena, Anima Vaish, Shweta Meena, Ramesh Chand Meena & Santosh Kumar. (2022) A mathematical model for analysing the significance of information technology resources in school education during pandemic. Journal of Interdisciplinary Mathematics 25:3, pages 741-752.
Read now
Ankit Kumar, Neeraj Sharma & Abhishek Kumar. (2022) End-to-end authentication based secure communication in vehicular ad hoc networks (VANET). Journal of Discrete Mathematical Sciences and Cryptography 25:1, pages 219-229.
Read now
Richa Rawal, Devesh Kumar Bandil & Srawan Nath. (2021) Data sparsity for twitter sentiment analysis in real-time from biased and noisy data. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2403-2413.
Read now
Ramesh Chand Meena, Keshav Meena, Ankit Kumar, Mukesh Gupta & Santosh Kumar. (2021) Status of address spoofing attack prevention techniques in software-defined networking (SDN). Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2341-2351.
Read now
Ankit Kumar, Neeraj Sharma & Abhishek Kumar. (2021) Improving security and privacy in VANET network using node authentication. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2471-2480.
Read now
C. Praveen Kumar & K. Rajendra Prasad. (2021) Multi-ROI segmentation for effective texture features of mammogram images. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2461-2469.
Read now
Priyanka, Bright Keswani & Rashid Hussain. (2021) Blockchain-based cryptography model to preserve privacy for smart contracts. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2279-2289.
Read now
Osama R. Shahin & Rady El Rwelli. (2021) Part of speech tagging for Arabic text based radial basis function. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2443-2459.
Read now
Alanazi Rayan & Hamoud Alshammari. (2021) Personal phone number privacy-preserving models for public use. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2377-2388.
Read now
Aakriti Sharma, Bright Keswani & Anjana Sangwan. (2021) Optimization of docker container security and its performance evaluation. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2365-2375.
Read now
Anjana Sangwan, Bright Keswani & Aakriti Sharma. (2021) Optimization of secure communication channel over the volunteer cloud and cloud computing. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2257-2266.
Read now
Neha Janu, Ankit Kumar, Linesh Raja, Vaibhav Bhatnagar, Abhishek Kumar, Santosh Kumar & Ramesh Chandra Poonia. (2021) Development of an efficient real-time H.264/AVC advanced video compression encryption scheme. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2245-2255.
Read now
Priyanka, Bright Keswani & Rashid Hussain. (2021) Assimilation of blockchain over cloud computing. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2267-2277.
Read now
Babu Ram & Neelendra Badal. (2019) Latency estimation based routing (LEBR) protocol in vehicular adhoc networks (VANETs). Journal of Discrete Mathematical Sciences and Cryptography 22:8, pages 1517-1531.
Read now
Vinita Malik & Sukhdip Singh. (2019) Security risk management in IoT environment. Journal of Discrete Mathematical Sciences and Cryptography 22:4, pages 697-709.
Read now

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.