default search action
Vincent Omollo Nyangaresi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Sathish Kumar, Chinthaginjala Venkata Ravikumar, Rajesh Anbazhagan, Vincent Omollo Nyangaresi, Giovanni Pau, P. Srinivasa Varma:
Submarine Acoustic Target Strength Modeling at High-Frequency Asymptotic Scattering. IEEE Access 12: 4859-4870 (2024) - [j21]Ahmad Yahiya Ahmad Bani Ahmad, Neha Verma, Nadia Mohamed Sarhan, Emad Mahrous Awwad, Amit Arora, Vincent Omollo Nyangaresi:
An IoT and Blockchain-Based Secure and Transparent Supply Chain Management Framework in Smart Cities Using Optimal Queue Model. IEEE Access 12: 51752-51771 (2024) - [j20]Xuehui Xu, R. S. M. Lakshmi Patibandla, Amit Arora, Muna S. Al-Razgan, Emad Mahrous Awwad, Vincent Omollo Nyangaresi:
An Adaptive Hybrid (1D-2D) Convolution-Based ShuffleNetV2 Mechanism for Irrigation Levels Prediction in Agricultural Fields With Smart IoTs. IEEE Access 12: 71901-71918 (2024) - [j19]Vincent Omollo Nyangaresi, Eesa Alsolami, Musheer Ahmad:
Trust-Enabled Energy Efficient Protocol for Secure Remote Sensing in Supply Chain Management. IEEE Access 12: 113553-113564 (2024) - [j18]Zahraa Abdullah Ali, Zaid Ameen Abduljabbar, Hamid Ali Abed Al-Asadi, Vincent Omollo Nyangaresi, Iman Qays Abduljaleel, Abdulla J. Y. Aldarwish:
A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids. Cryptogr. 8(2): 20 (2024) - [j17]Mustafa A. Al Sibahee, Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Chengwen Luo, Jin Zhang, Junchao Ma:
Two-Factor Privacy-Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks. IEEE Internet Things J. 11(8): 14253-14266 (2024) - [j16]Mustafa A. Al Sibahee, Zaid Ameen Abduljabbar, Alladoumbaye Ngueilbaye, Chengwen Luo, Jianqiang Li, Yijing Huang, Jin Zhang, Naveed Khan, Vincent Omollo Nyangaresi, Ali Hasan Ali:
Blockchain-Based Authentication Schemes in Smart Environments: A Systematic Literature Review. IEEE Internet Things J. 11(21): 34774-34796 (2024) - [j15]Salim Sabah Bulbul, Zaid Ameen Abduljabbar, Duaa Fadhel Najem, Vincent Omollo Nyangaresi, Junchao Ma, Abdulla J. Y. Aldarwish:
Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control. J. Sens. Actuator Networks 13(1): 12 (2024) - [c16]Zahraa Sh. Alzaidi, Ali A. Yassin, Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi:
Development Anonymous Authentication Maria et al.'s Scheme of VANETs Using Blockchain and Fog Computing with QR Code Technique. CoDIT 2024: 2247-2252 - [c15]Muwafaq Jawad, Ali A. Yassin, Hamid Ali Abed Al-Asadi, Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi:
IoHT System Authentication Through the Blockchain Technology: A Review. CoDIT 2024: 2253-2258 - [c14]Batool Mohammed Radhi, Mohammed Abdulridha Hussain, Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi:
Secure and Fast Remote Application-Based Authentication Dragonfly Using an LED Algorithm in Smart Buildings. ICAIIC 2024: 509-517 - [c13]Ali Hasan Ali, Hend Muslim Jasim, Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Samir M. Umran, Junchao Ma, Dhafer G. Honi:
Provably Efficient and Fast Technique for Determining the Size of a Brain Tumor in T1 MRI Images. ICAIIC 2024: 608-613 - 2023
- [j14]Vincent Omollo Nyangaresi:
Privacy Preserving Three-factor Authentication Protocol for Secure Message Forwarding in Wireless Body Area Networks. Ad Hoc Networks 142: 103117 (2023) - [j13]Wafaa Al-Chaab, Zaid Ameen Abduljabbar, Enas Wahab Abood, Vincent Omollo Nyangaresi, Hussein M. Mohammed, Junchao Ma:
Secure and Low-Complexity Medical Image Exchange Based on Compressive Sensing and LSB Audio Steganography. Informatica (Slovenia) 47(6) (2023) - [j12]Samir M. Umran, Songfeng Lu, Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi:
Multi-chain blockchain based secure data-sharing framework for industrial IoTs smart devices in petroleum industry. Internet Things 24: 100969 (2023) - [c12]Haitang Zhang, Junchao Ma, Zixia Qiu, Junmei Yao, Mustafa A. Al Sibahee, Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi:
Multi-GPU Parallel Pipeline Rendering with Splitting Frame. CGI 2023: 223-235 - 2022
- [j11]Zaid Ameen Abduljabbar, Iman Qays Abduljaleel, Junchao Ma, Mustafa A. Al Sibahee, Vincent Omollo Nyangaresi, Dhafer G. Honi, Ayad I. Abdulsada, Xianlong Jiao:
Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Map. IEEE Access 10: 26257-26270 (2022) - [j10]Vincent Omollo Nyangaresi:
Terminal independent security token derivation scheme for ultra-dense IoT networks. Array 15: 100210 (2022) - [j9]Vincent Omollo Nyangaresi, Anthony Joachim Rodrigues:
Efficient handover protocol for 5G and beyond networks. Comput. Secur. 113: 102546 (2022) - [j8]Vincent Omollo Nyangaresi, Musheer Ahmad, Ahmed Alkhayyat, Wei Feng:
Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things. Expert Syst. J. Knowl. Eng. 39(10) (2022) - [j7]Vincent Omollo Nyangaresi, Mohammed Abd-Elnaby, Mahmoud M. A. Eid, Ahmed Nabih Zaki Rashed:
Trusted authority based session key agreement and authentication algorithm for smart grid networks. Trans. Emerg. Telecommun. Technol. 33(9) (2022) - [j6]Vincent Omollo Nyangaresi, Anthony Joachim Rodrigues, Ahmad A. Al Rababah:
Secure Protocol for Resource-Constrained IoT Device Authentication. Int. J. Interdiscip. Telecommun. Netw. 14(1): 1-15 (2022) - [j5]Vincent Omollo Nyangaresi, Anthony Joachim Rodrigues, Silvance O. Abeka:
Machine Learning Protocol for Secure 5G Handovers. Int. J. Wirel. Inf. Networks 29(1): 14-35 (2022) - [j4]Vincent Omollo Nyangaresi:
Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography. J. Syst. Archit. 133: 102763 (2022) - [j3]Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Mustafa A. Al Sibahee, Mudhafar Jalil Jassim Ghrabat, Junchao Ma, Iman Qays Abduljaleel, Abdulla J. Y. Aldarwish:
Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks. J. Sens. Actuator Networks 11(3): 55 (2022) - [j2]Iman Qays Abduljaleel, Zaid Ameen Abduljabbar, Mustafa A. Al Sibahee, Mudhafar Jalil Jassim Ghrabat, Junchao Ma, Vincent Omollo Nyangaresi:
A Lightweight Hybrid Scheme for Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques. J. Sens. Actuator Networks 11(4): 66 (2022) - [j1]Vincent Omollo Nyangaresi:
A Formally Validated Authentication Algorithm for Secure Message Forwarding in Smart Home Networks. SN Comput. Sci. 3(5): 364 (2022) - [c11]Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Junchao Ma, Mustafa A. Al Sibahee, Mustafa S. Khalefa, Dhafer G. Honi:
MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones. FABULOUS 2022: 16-36 - [c10]Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Ismail Yaqub Maolood, Mustafa A. Al Sibahee, Junchao Ma, Abdulla J. Y. Aldarwish:
Transient Session Key Derivation Protocol for Key Escrow Prevention in Public Key Infrastructure. IoECon 2022: 103-116 - 2021
- [c9]Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Mustafa A. Al Sibahee, Enas Wahab Abood, Iman Qays Abduljaleel:
Dynamic Ephemeral and Session Key Generation Protocol for Next Generation Smart Grids. ADHOCNETS/TRIDENTCOM 2021: 188-204 - [c8]Vincent Omollo Nyangaresi:
Lightweight Key Agreement and Authentication Protocol for Smart Homes. AFRICON 2021: 1-6 - [c7]Zeyad Mohammad, Vincent Omollo Nyangaresi, Ahmad Abusukhon:
On the Security of the Standardized MQV Protocol and Its Based Evolution Protocols. ICIT 2021: 320-325 - [c6]Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Salah H. Abbdal Refish, Mustafa A. Al Sibahee, Enas Wahab Abood, Songfeng Lu:
Anonymous Key Agreement and Mutual Authentication Protocol for Smart Grids. CrownCom/WiCON 2021: 325-340 - [c5]Vincent Omollo Nyangaresi, Anthony Joachim Rodrigues, Nidhal Kamel Taha:
Mutual Authentication Protocol for Secure VANET Data Exchanges. FABULOUS 2021: 58-76 - [c4]Mustafa A. Al Sibahee, Vincent Omollo Nyangaresi, Junchao Ma, Zaid Ameen Abduljabbar:
Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things. IoTaaS 2021: 3-18 - [c3]Vincent Omollo Nyangaresi, Mohammed A. Morsy:
Towards Privacy Preservation in Internet of Drones. RTSI 2021: 306-311 - [c2]Vincent Omollo Nyangaresi, Anselme Russel Affane Moundounga:
Secure Data Exchange Scheme for Smart Grids. RTSI 2021: 312-316 - 2020
- [c1]Vincent Omollo Nyangaresi, Anthony Joachim Rodrigues, Silvance O. Abeka:
ANN-FL Secure Handover Protocol for 5G and Beyond Networks. AFRICOMM 2020: 99-118
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint