Pairing free and implicit certificate based signcryption scheme with proxy re-encryption for secure cloud data storage A Braeken, P Shabisha, A Touhafi, K Steenhaut 2017 3rd International Conference of Cloud Computing Technologies and …, 2017 | 16 | 2017 |
Fog-orchestrated and server-controlled anonymous group authentication and key agreement P Shabisha, A Braeken, P Kumar, K Steenhaut IEEE Access 7, 150247-150261, 2019 | 14 | 2019 |
Elliptic curve qu-vanstone based signcryption schemes with proxy re-encryption for secure cloud data storage P Shabisha, A Braeken, A Touhafi, K Steenhaut Cloud Computing and Big Data: Technologies, Applications and Security 3, 1-18, 2019 | 14 | 2019 |
Elliptic curve‐based proxy re‐signcryption scheme for secure data storage on the cloud S Patonico, P Shabisha, A Braeken, A Touhafi, K Steenhaut Concurrency and Computation: Practice and Experience 32 (17), e5657, 2020 | 10 | 2020 |
Security enhanced emergency situation detection system for ambient assisted living P Shabisha, C Sandeepa, C Moremada, N Dissanayaka, T Gamage, ... IEEE Open Journal of the Computer Society 2, 241-259, 2021 | 9 | 2021 |
Toward the inclusion of end-to-end security in the OM2M platform S Patonico, TL Nguyen, P Shabisha, A Braeken, K Steenhaut The Journal of Supercomputing 77, 4056-4080, 2021 | 5 | 2021 |
Anonymous symmetric key based key agreement protocol for fog computing P Shabisha, K Steenhaut, A Braeken IEEE IoT Journal, 2020 | 5 | 2020 |
Symmetric key-based secure storage and retrieval of IoT data on a semi-trusted cloud server P Shabisha, A Braeken, K Steenhaut Wireless Personal Communications 113 (1), 537-553, 2020 | 3 | 2020 |
DTLS Integration in oneM2M based on Zolertia RE-motes S Patonico, TL Nguyen, P Shabisha, A Braeken, K Steenhaut The 4th IEEE International Conference on Cloud Computing Technologies and …, 2018 | 1 | 2018 |
'Internet of Things: A contribution to the improvement of IoT for interoperability and enhanced security' P Shabisha | | 2021 |