References
- Abbasinezhad-Mood, D., & Nikooghadam, M. (2018). Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications. Future Generation Computer Systems, 84, 47–57. https://doi.org/https://doi.org/10.1016/j.future.2018.02.034
- Arash, H. A., & Kadir, F. H. A. (2017). Towards a network-based framework for android malware detection and characterization [Paper presentation]. The proceeding of the 15th International Conference on Privacy, Security and Trust. PST.
- Armerding, T. (2018). The 18 biggest data breaches of the 21st century. https://www.csoonline.com
- Balaji, N. A., Sukumar, R., & Parvathy, M. (2019). Enhanced dual authentication and key management scheme for data authentication in vehicular ad hoc network. Computers & Electrical Engineering, 76, 94–110. https://doi.org/https://doi.org/10.1016/j.compeleceng.2019.03.007
- Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J.-P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125–142. https://doi.org/https://doi.org/10.1016/j.pmcj.2015.01.006
- Dodero, J. M., Rodriguez-Garcia, M., Ruiz-Rube, I., & Palomo-Duarte, M. (2019). Privacy-preserving reengineering of model-view-controller application architectures using linked data. Journal of Web Engineering, 18(7), 695–728. https://doi.org/https://doi.org/10.13052/jwe1540-9589.1875
- Fan, C-I., Chan, Y-C., & Zhang, Z-K. (2005). Robust remote authentication scheme with smart cards. Computers & Security, 24(8), 619–628.
- Fouda, M. M., Fadlullah, Z. M., & Kato, N. (2011). A lightweight message authentication scheme for smart grid communications. IEEE Transactions on Smart Grid, 2(4), 675–685. https://doi.org/https://doi.org/10.1109/TSG.2011.2160661
- Guo, C., Luo, N., Bhuiyan, M. Z. A., Jie, Y., Chen, Y., Feng, B., & Alam, M. (2018). Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage. Future Generation Computer Systems, 84, 190–199. https://doi.org/https://doi.org/10.1016/j.future.2017.07.038
- Hwang, M-S., Chong, S-K., & Chen, T-Y. (2010). Dos-resistant ID-based password authentication scheme using smart cards. Journal of Systems and Software, 83(1), 163–172.
- Hwang, M-S., & Li, L-H. (2000). A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46(1), 28–30.
- Kalra, S., & Sood, S. K. (2015). Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing, 24, 210–223. https://doi.org/https://doi.org/10.1016/j.pmcj.2015.08.001
- Karati, A., Amin, R., & Islam, S. H. (2018). Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment. IEEE Transactions on Cloud Computing.
- Kilinc, H. H., & Yanik, T. (2014). A survey of sip authentication and key agreement schemes. IEEE Communications Surveys & Tutorials, 16(2), 1005–1023. https://doi.org/https://doi.org/10.1109/SURV.2013.091513.00050
- Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and Applications, 22, 113–122. https://doi.org/https://doi.org/10.1016/j.jisa.2014.09.005
- Kumar, V., Ahmad, M., & Kumari, A. (2019). A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS. Telematics and Informatics, 38, 100–117. https://doi.org/https://doi.org/10.1016/j.tele.2018.09.001
- Kumari, A., Jangirala, S., Abbasi, M. Y., Kumar, V., & Alam, M. (2020). Eseap: ECC based secure and efficient mutual authentication protocol using smart card. Journal of Information Security and Applications, 51, 102443. https://doi.org/https://doi.org/10.1016/j.jisa.2019.102443
- Li, H., Yang, C., & Liu, J. (2019). A novel security media cloud framework. Computers & Electrical Engineering, 74, 605–615. https://doi.org/https://doi.org/10.1016/j.compeleceng.2018.07.022
- Li, J., Sun, L., Yan, Q., Li, Z., Srisa-An, W., & Ye, H. (2018). Significant permission identification for machine-learning-based android malware detection. IEEE Transactions on Industrial Informatics, 14(7), 3216–3225. https://doi.org/https://doi.org/10.1109/TII.2017.2789219
- Li, W., Xuelian, L., & Gao, J. (2019). Design of secure authenticated key management protocol for cloud computing environments. IEEE Transactions on Dependable and Secure Computing.
- Li, X., Xiong, Y., Ma, J., & Wang, W. (2012). An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications, 35(2), 763–769. https://doi.org/https://doi.org/10.1016/j.jnca.2011.11.009
- Lim, S. Y., Kiah, M. M., & Ang, T. F. (2017). Security issues and future challenges of cloud service authentication. Acta Polytechnica Hungarica, 14(2), 69–89.
- Liu, Z. P., Wu, F. L., Shang, K. Y., & Chai, W. L. (2013). C-mas: The cloud mutual authentication scheme. Advanced Materials Research, 756–759, 3209–3214. https://doi.org/https://doi.org/10.4028/www.scientific.net/AMR.756-759.3209
- Ma, Z., Liu, Y., & Wang, Z. (2018). A machine learning-based scheme for the security analysis of authentication and key agreement protocols. Neural Computing and Applications, 1–13.
- Mahmood, K., Ashraf Chaudhry, S., Naqvi, H., Shon, T., & Farooq Ahmad, H. (2016). A lightweight message authentication scheme for smart grid communications in power sector. Computers & Electrical Engineering, 52, 114–124. https://doi.org/https://doi.org/10.1016/j.compeleceng.2016.02.017
- Mahmood, K., Chaudhry, S. A., Naqvi, H., Kumari, S., Li, X., & Sangaiah, A. K. (2018). An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Generation Computer Systems, 81, 557–565. https://doi.org/https://doi.org/10.1016/j.future.2017.05.002
- Melki, R., Noura, H. N., & Chehab, A. (2020). Lightweight multi-factor mutual authentication protocol for IoT devices. International Journal of Information Security, 19(6), 679–616. https://doi.org/https://doi.org/10.1007/s10207-019-00484-5
- Nimmy, K., & Sethumadhavan, M. (2014). Novel mutual authentication protocol for cloud computing using secret sharing and steganography [Paper presentation]. ICADIWT (pp. 101–106). IEEE.
- Rijvordt, W., Hogenboom, F., & Frasincar, F. (2019). Ontology-driven news classification with aethalides. Journal of Web Engineering, 18(7), 627–654. https://doi.org/https://doi.org/10.13052/jwe1540-9589.1873
- Saxena, D., & Saxena, S. (2015). Highly advanced cloudlet scheduling algorithm based on particle swarm optimization [Paper presentation]. 2015 Eighth International Conference on Contemporary Computing (IC3) ( pp. 111–116). IEEE. https://doi.org/https://doi.org/10.1109/IC3.2015.7346663
- Saxena, D., & Singh, A. K. (2020a). Energy aware resource efficient-(eare) server consolidation framework for cloud datacenter. In D. Saxena & A. K. Singh (Eds.), Advances in communication and computational technology (pp. 1455–1464). Springer.
- Saxena, D., & Singh, A. K. (2020b). Security embedded dynamic resource allocation model for cloud data centre. Electronics Letters, 56(20), 1062–1065. https://doi.org/https://doi.org/10.1049/el.2020.1736
- Saxena, D., & Singh, A. K. (2020c). Auto-adaptive learning-based workload forecasting in dynamic cloud environment. International Journal of Computers and Applications, 1–11. https://doi.org/https://doi.org/10.1080/1206212X.2020.1830245
- Saxena, D., & Singh, A. K. (2020d). A proactive autoscaling and energy-efficient vm allocation framework using online multi-resource neural network for cloud data center. Neurocomputing, 426, 248–264. https://doi.org/https://doi.org/10.1016/j.neucom.2020.08.076
- Saxena, D., Chauhan, R., & Kait, R. (2016). Dynamic fair priority optimization task scheduling algorithm in cloud computing: Concepts and implementations. International Journal of Computer Network and Information Security, 8(2), 41–48. https://doi.org/https://doi.org/10.5815/ijcnis.2016.02.05
- Saxena, D., Vaisla, K. S., Rauthan, M. S. (2018). Abstract model of trusted and secure middleware framework for multi-cloud environment [Paper presentation]. International Conference on Advanced Informatics for Computing Research (pp. 469–479). Springer.
- Saxena, S., & Saxena, D. (2015). Ewsa: An enriched workflow scheduling algorithm in cloud computing [Paper presentation]. 2015 International Conference on Computing, Communication and Security (ICCCS) (pp. 1–5). IEEE. https://doi.org/https://doi.org/10.1109/CCCS.2015.7374202
- Sood, S-K., Sarje, A-K., & Singh, K.A. (2011). Secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications, 34(2), 609–618.
- Sreeram, I., & Vuppala, V. P. K. (2019). Http flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm. Applied Computing and Informatics, 15(1), 59–66. https://doi.org/https://doi.org/10.1016/j.aci.2017.10.003
- Sule, R., Katti, R. S., & Kavasseri, R. G. (2012). A variable length fast message authentication code for secure communication in smart grids [Paper presentation]. 2012 IEEE Power and Energy Society General Meeting (pp. 1–6). IEEE.
- Vincent, O. R., Folorunso, O., & Akinde, A. (2010). Improving e-payment security using elliptic curve cryptosystem. Electronic Commerce Research, 10(1), 27–41. https://doi.org/https://doi.org/10.1007/s10660-010-9047-z
- Wu, D., & Zhou, C. (2011). Fault-tolerant and scalable key management for smart grid. IEEE Transactions on Smart Grid, 2(2), 375–381. https://doi.org/https://doi.org/10.1109/TSG.2011.2120634
- Xia, J., & Wang, Y. (2012). Secure key distribution for the smart grid. IEEE Transactions on Smart Grid, 3(3), 1437–1443. https://doi.org/https://doi.org/10.1109/TSG.2012.2199141