default search action
Awaneesh Kumar Yadav
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Engin Zeydan, Luis Blanco, Josep Mangues-Bafalluy, Suayb S. Arslan, Yekta Turk, Awaneesh Kumar Yadav, Madhusanka Liyanage:
Blockchain-Based Self-Sovereign Identity: Taking Control of Identity in Federated Learning. IEEE Open J. Commun. Soc. 5: 5764-5781 (2024) - [j8]Pasika Ranaweera, Awaneesh Kumar Yadav, Madhusanka Liyanage, Anca Delia Jurcut:
A Novel Authentication Protocol for 5G gNodeBs in Service Migration Scenarios of MEC. IEEE Trans. Dependable Secur. Comput. 21(4): 2930-2948 (2024) - [j7]Awaneesh Kumar Yadav:
SKAP-NS: A Symmetric Key-Based Authentication Protocol for 5G Network Slicing. IEEE Trans. Ind. Informatics 20(11): 13363-13372 (2024) - [j6]Shalitha Wijethilaka, Awaneesh Kumar Yadav, An Braeken, Madhusanka Liyanage:
Blockchain-Based Secure Authentication and Authorization Framework for Robust 5G Network Slicing. IEEE Trans. Netw. Serv. Manag. 21(4): 3988-4005 (2024) - [j5]Awaneesh Kumar Yadav, Mohammad Shojafar, An Braeken:
iVFAS: An Improved Vehicle-to-Fog Authentication System for Secure and Efficient Fog-Based Road Condition Monitoring. IEEE Trans. Veh. Technol. 73(9): 12570-12584 (2024) - [c12]Madhusanka Liyanage, Pawani Porambage, Engin Zeydan, Thulitha Senavirathne, Yushan Siriwardhana, Awaneesh Kumar Yadav, Bartlomiej Siniarski:
Advancing Security for 6G Smart Networks and Services. EuCNC/6G Summit 2024: 1169-1174 - [c11]Abdullah Aydeger, Engin Zeydan, Awaneesh Kumar Yadav, Kasun T. Hemachandra, Madhusanka Liyanage:
Towards a Quantum-Resilient Future: Strategies for Transitioning to Post-Quantum Cryptography. NoF 2024: 195-203 - 2023
- [j4]Awaneesh Kumar Yadav, Manoj Misra, Pradumn Kumar Pandey, Madhusanka Liyanage:
An EAP-Based Mutual Authentication Protocol for WLAN-Connected IoT Devices. IEEE Trans. Ind. Informatics 19(2): 1343-1355 (2023) - [j3]Awaneesh Kumar Yadav, An Braeken, Manoj Misra:
Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing. J. Supercomput. 79(10): 11261-11299 (2023) - [j2]Awaneesh Kumar Yadav, Shalitha Wijethilaka, An Braeken, Manoj Misra, Madhusanka Liyanage:
An Enhanced Cross-Network-Slice Authentication Protocol for 5G. IEEE Trans. Sustain. Comput. 8(4): 555-573 (2023) - [c10]Awaneesh Kumar Yadav, An Braeken, Manoj Misra, Madhusanka Liyanage:
A Provably Secure and Efficient 5G-AKA Authentication Protocol using Blockchain. CCNC 2023: 1110-1115 - [c9]Awaneesh Kumar Yadav, Pradumn Kumar Pandey, Kuljeet Kaur, Satinder Singh, Abbas Bradai:
PSLP-5G: A Provably Secure and Lightweight Protocol for 5G Communication. ICC 2023: 4534-4539 - [c8]Awaneesh Kumar Yadav, An Braeken, Mika Ylianttila, Madhusanka Liyanage:
A Blockchain-based Authentication Protocol for Metaverse Environments using a Zero Knowledge Proof. MetaCom 2023: 242-249 - [c7]Awaneesh Kumar Yadav, Manoj Misra, An Braeken, Madhusanka Liyanage:
A Secure Blockchain-based Authentication and Key Agreement Protocol for 5G Roaming. TrustCom 2023: 1324-1331 - [c6]Shalitha Wijethilaka, Awaneesh Kumar Yadav, An Braeken, Madhusanka Liyanage:
A Novel Blockchain-based Decentralized Multi-party Certificate Management Framework. TrustCom 2023: 1361-1368 - 2022
- [j1]Awaneesh Kumar Yadav, Manoj Misra, Pradumn Kumar Pandey, An Braeken, Madhusanka Liyanage:
An improved and provably secure symmetric-key based 5G-AKA Protocol. Comput. Networks 218: 109400 (2022) - [c5]Awaneesh Kumar Yadav, Manoj Misra, Pradumn Kumar Pandey, Kuljeet Kaur, Sahil Garg, Xi Chen:
A Provably Secure ECC-based Multi-factor 5G-AKA Authentication Protocol. GLOBECOM 2022: 516-521 - [c4]Pasika Ranaweera, Awaneesh Kumar Yadav, Madhusanka Liyanage, Anca Delia Jurcut:
Service Migration Authentication Protocol for MEC. GLOBECOM 2022: 5493-5498 - [c3]Awaneesh Kumar Yadav, Manoj Misra, Pradumn Kumar Pandey, Kuljeet Kaur, Sahil Garg, Madhusanka Liyanage:
LEMAP: A Lightweight EAP based Mutual Authentication Protocol for IEEE 802.11 WLAN. ICC 2022: 692-697 - 2020
- [c2]Awaneesh Kumar Yadav, Manoj Misra, Madhusanka Liyanage, Gaurav Varshney:
Secure and User Efficient EAP-based Authentication Protocol for IEEE 802.11 Wireless LANs. MASS 2020: 576-584
2010 – 2019
- 2018
- [c1]Byomakesh Mahapatra, Ashok Kumar Turuk, Niranjan Kumar Ray, Awaneesh Kumar Yadav:
H-RAN: An Approach Toward Cloud-RAN Load Balancing. ICIT 2018: 216-220
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint