Follow
Amiya Kumar Sahu
Title
Cited by
Cited by
Year
Internet of Things attack detection using hybrid Deep Learning Model
AK Sahu, S Sharma, M Tanveer, R Raja
Computer Communications 176, 146-154, 2021
1952021
Lightweight Multi-party Authentication and Key Agreement Protocol in IoT based E-Healthcare Service
AK SAHU, S Sharma, D Puthal
ACM Transactions on Multimedia Computing, Communications, and Applications …, 0
33*
Deep learning-based continuous authentication for an IoT-enabled healthcare service
AK Sahu, S Sharma, R Raja
Computers and Electrical Engineering 99, 107817, 2022
292022
Secure authentication protocol for 5G enabled IoT network
S Sharma, S Satapathy, S Singh, AK Sahu, MS Obaidat, S Saxena, ...
2018 Fifth International Conference on Parallel, Distributed and Grid …, 2018
232018
Secure authentication protocol for IoT architecture
AK Sahu, S Sharma, D Puthal, A Pandey, R Shit
2017 International Conference on Information Technology (ICIT), 220-224, 2017
152017
A study of authentication protocols in internet of things
AK Sahu, S Sharma, SS Tripathi, KN Singh
2019 International Conference on Information Technology (ICIT), 217-221, 2019
82019
A secure lightweight mutual authentication and key agreement protocol for healthcare systems
AK Sahu, S Sharma, A Nanda
Intelligent Data Security Solutions for e-Health Applications, 293-308, 2020
52020
The system can't perform the operation now. Try again later.
Articles 1–7