default search action
Bakkiam David Deebak
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j44]Hafiz Muhammad Waseem, Muhammad Asfand Hafeez, Shabir Ahmad, Bakkiam David Deebak, Noor Munir, Abdul Majeed, Seong Oun Hwang:
Constructing Highly Nonlinear Cryptographic Balanced Boolean Functions on Learning Capabilities of Recurrent Neural Networks. IEEE Access 12: 150255-150267 (2024) - [j43]Patruni Muralidhara Rao, Bakkiam David Deebak:
Lightweight two-factor authentication framework with privacy preserving for smart eHealth. Peer Peer Netw. Appl. 17(1): 373-396 (2024) - [j42]Bakkiam David Deebak, Seong Oun Hwang:
Healthcare Applications Using Blockchain With a Cloud-Assisted Decentralized Privacy-Preserving Framework. IEEE Trans. Mob. Comput. 23(5): 5897-5916 (2024) - [j41]Bakkiam David Deebak, Seong Oun Hwang:
Privacy Preserving Based on Seamless Authentication With Provable Key Verification Using mIoMT for B5G-Enabled Healthcare Systems. IEEE Trans. Serv. Comput. 17(3): 1097-1113 (2024) - 2023
- [j40]Patruni Muralidhara Rao, Bakkiam David Deebak:
A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions. Ad Hoc Networks 146: 103159 (2023) - [j39]Bakkiam David Deebak, Seong Oun Hwang:
Intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era. Comput. Networks 225: 109664 (2023) - [j38]Bakkiam David Deebak, Fadi Al-Turjman:
Lightweight privacy-aware secure authentication scheme for cyber-physical systems in the edge intelligence era. Concurr. Comput. Pract. Exp. 35(13) (2023) - [j37]Bakkiam David Deebak, Fida Hussain Memon, Sunder Ali Khowaja, Kapal Dev, Weizheng Wang, Nawab Muhammad Faseeh Qureshi, Chunhua Su:
A Lightweight Blockchain-Based Remote Mutual Authentication for AI-Empowered IoT Sustainable Computing Systems. IEEE Internet Things J. 10(8, April 15): 6652-6660 (2023) - [j36]Patruni Muralidhara Rao, Bakkiam David Deebak:
Security and privacy issues in smart cities/industries: technologies, applications, and challenges. J. Ambient Intell. Humaniz. Comput. 14(8): 10517-10553 (2023) - [j35]Bakkiam David Deebak, Fadi Al-Turjman:
EEI-IoT: Edge-Enabled Intelligent IoT Framework for Early Detection of COVID-19 Threats. Sensors 23(6): 2995 (2023) - [j34]Bakkiam David Deebak, Seong Oun Hwang:
A Cloud-Assisted Medical Cyber-Physical System Using a Privacy-Preserving Key Agreement Framework and a Chebyshev Chaotic Map. IEEE Syst. J. 17(4): 5543-5554 (2023) - [j33]Bakkiam David Deebak, Fida Hussain Memon, Kapal Dev, Sunder Ali Khowaja, Weizheng Wang, Nawab Muhammad Faseeh Qureshi:
TAB-SAPP: A Trust-Aware Blockchain-Based Seamless Authentication for Massive IoT-Enabled Industrial Applications. IEEE Trans. Ind. Informatics 19(1): 243-250 (2023) - 2022
- [j32]Bakkiam David Deebak, Fida Hussain Memon, Kapal Dev, Sunder Ali Khowaja, Nawab Muhammad Faseeh Qureshi:
AI-enabled privacy-preservation phrase with multi-keyword ranked searching for sustainable edge-cloud networks in the era of industrial IoT. Ad Hoc Networks 125: 102740 (2022) - [j31]Bakkiam David Deebak, Fadi Al-Turjman:
A robust and distributed architecture for 5G-enabled networks in the smart blockchain era. Comput. Commun. 181: 293-308 (2022) - [j30]Bakkiam David Deebak, Fadi M. Al-Turjman:
Digital-twin assisted: Fault diagnosis using deep transfer learning for machining tool condition. Int. J. Intell. Syst. 37(12): 10289-10316 (2022) - [j29]Fadi M. Al-Turjman, Bakkiam David Deebak:
A Proxy-Authorized Public Auditing Scheme for Cyber-Medical Systems Using AI-IoT. IEEE Trans. Ind. Informatics 18(8): 5371-5382 (2022) - [j28]Bakkiam David Deebak, Fida Hussain Memon, Sunder Ali Khowaja, Kapal Dev, Weizheng Wang, Nawab Muhammad Faseeh Qureshi:
In the Digital Age of 5G Networks: Seamless Privacy-Preserving Authentication for Cognitive-Inspired Internet of Medical Things. IEEE Trans. Ind. Informatics 18(12): 8916-8923 (2022) - 2021
- [j27]Bakkiam David Deebak, Fadi M. Al-Turjman:
Lightweight authentication for IoT/Cloud-based forensics in intelligent data computing. Future Gener. Comput. Syst. 116: 406-425 (2021) - [j26]Bakkiam David Deebak, Fadi M. Al-Turjman:
How to Exploit 5G Networks for IoT e-Health Security and Privacy Challenges. IEEE Internet Things Mag. 4(3): 6-11 (2021) - [j25]Bakkiam David Deebak, Fadi M. Al-Turjman:
Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems. J. Inf. Secur. Appl. 58: 102689 (2021) - [j24]Bakkiam David Deebak, Fadi M. Al-Turjman:
Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements. J. Inf. Secur. Appl. 58: 102749 (2021) - [j23]Bakkiam David Deebak, Fadi Al-Turjman:
Smart Mutual Authentication Protocol for Cloud Based Medical Healthcare Systems Using Internet of Medical Things. IEEE J. Sel. Areas Commun. 39(2): 346-360 (2021) - [j22]Bakkiam David Deebak, Fadi M. Al-Turjman, Anand Nayyar:
Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care. Multim. Tools Appl. 80(11): 17103-17128 (2021) - [j21]Fadi Al-Turjman, Bakkiam David Deebak:
Seamless Authentication: For IoT-Big Data Technologies in Smart Industrial Application Systems. IEEE Trans. Ind. Informatics 17(4): 2919-2927 (2021) - [j20]Bakkiam David Deebak, Fadi Al-Turjman, Mamoun Alazab:
Dynamic-Driven Congestion Control and Segment Rerouting in the 6G-Enabled Data Networks. IEEE Trans. Ind. Informatics 17(10): 7165-7173 (2021) - 2020
- [j19]Bakkiam David Deebak, Fadi Al-Turjman:
A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Networks 97 (2020) - [j18]Bakkiam David Deebak, Fadi Al-Turjman, Leonardo Mostarda:
Seamless secure anonymous authentication for cloud-based mobile edge computing. Comput. Electr. Eng. 87: 106782 (2020) - [j17]Bakkiam David Deebak, Fadi Al-Turjman:
A smart lightweight privacy preservation scheme for IoT-based UAV communication systems. Comput. Commun. 162: 102-117 (2020) - [j16]Bakkiam David Deebak, Fadi Al-Turjman, Moayad Aloqaily, Omar Alfandi:
IoT-BSFCAN: A smart context-aware system in IoT-Cloud using mobile-fogging. Future Gener. Comput. Syst. 109: 368-381 (2020) - [j15]Fadi Al-Turjman, Bakkiam David Deebak:
Privacy-Aware Energy-Efficient Framework Using the Internet of Medical Things for COVID-19. IEEE Internet Things Mag. 3(3): 64-68 (2020) - [c1]Bakkiam David Deebak, Fadi Al-Turjman:
COVID-19 Patient Care: A Content-Based Collaborative Filtering Using Intelligent Recommendation System. SmartCity360° 2020: 31-44
2010 – 2019
- 2019
- [j14]Bakkiam David Deebak, Fadi Al-Turjman, Moayad Aloqaily, Omar Alfandi:
An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT. IEEE Access 7: 135632-135649 (2019) - [j13]Fadi Al-Turjman, Bakkiam David Deebak, Leonardo Mostarda:
Energy Aware Resource Allocation in Multi-Hop Multimedia Routing via the Smart Edge Device. IEEE Access 7: 151203-151214 (2019) - [j12]Bakkiam David Deebak, Fadi Al-Turjman, Leonardo Mostarda:
A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems. Sensors 19(18): 3821 (2019) - 2018
- [j11]Bakkiam David Deebak, Enver Ever, Fadi Al-Turjman:
Analyzing enhanced real-time uplink scheduling algorithm in 3GPP LTE-advanced networks using multimedia systems. Trans. Emerg. Telecommun. Technol. 29(10) (2018) - 2017
- [j10]Fadi Al-Turjman, Yoney Kirsal Ever, Enver Ever, Huan Xuan Nguyen, Bakkiam David Deebak:
Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks. IEEE Access 5: 24617-24631 (2017) - [j9]Bakkiam David Deebak:
Mutual authentication scheme for multimedia medical information systems. Multim. Tools Appl. 76(8): 10741-10759 (2017) - 2016
- [j8]Bakkiam David Deebak, Rajappa Muthaiah, Karuppuswamy Thenmozhi, Pitchai Iyer Swaminathan:
Analyzing secure key authentication and key agreement protocol for promising features of IP multimedia subsystem using IP multimedia server-client systems. Multim. Tools Appl. 75(4): 2111-2143 (2016) - [j7]Bakkiam David Deebak, Rajappa Muthaiah, Karuppuswamy Thenmozhi, Pitchai Iyer Swaminathan:
Analyzing three-party authentication and key agreement protocol for real time IP multimedia server-client systems. Multim. Tools Appl. 75(10): 5795-5817 (2016) - [j6]Bakkiam David Deebak:
Secure and Efficient Mutual Adaptive User Authentication Scheme for Heterogeneous Wireless Sensor Networks Using Multimedia Client-Server Systems. Wirel. Pers. Commun. 87(3): 1013-1035 (2016) - 2015
- [j5]Bakkiam David Deebak, Rajappa Muthaiah, Karuppusamy Thenmozhi, Pitchai Iyer Swaminathan:
Evaluating Three Party Authentication and Key Agreement Protocols Using IP Multimedia Server-Client Systems. Wirel. Pers. Commun. 81(1): 77-99 (2015) - [j4]Bakkiam David Deebak, Rajappa Muthaiah, Karuppuswamy Thenmozhi, Pitchai Iyer Swaminathan:
Analyzing Threefold Schemes for Enhancing Communication Channel Efficiencies Using IP Multimedia Server-Client Systems for LTE Networks. Wirel. Pers. Commun. 84(3): 2079-2118 (2015) - [j3]Bakkiam David Deebak, Rajappa Muthaiah, Karuppuswamy Thenmozhi, Pitchai Iyer Swaminathan:
A Dynamic-Identity Based Multimedia Server Client Authentication Scheme for Tele-Care Multimedia Medical Information System. Wirel. Pers. Commun. 85(1): 241-261 (2015) - 2013
- [j2]Rajappa Muthaiah, Bakkiam David Deebak, Karuppusamy Thenmozhi, Pitchai Iyer Swaminathan:
Interoperation Key Schema for Social Media Tools in IP Multimedia Subsystem. J. Commun. 8(11): 730-737 (2013) - [j1]Bakkiam David Deebak, Rajappa Muthaiah, Karuppusamy Thenmozhi, Pitchai Iyer Swaminathan:
IP Multimedia Subsystem - An Intrusion Detection System. Smart Comput. Rev. 3(1): 1-13 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint