A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments

Authors : Chandrashekhar Meshram 1, Agbotiname Lucky Imoize 2,3,*, Amer Aljaedi 4, Adel R. Alharbi 4, Sajjad Shaukat Jamal 5 and Sharad Kumar Barve Abstract : The place of public key cryptography (PKC) in guaranteeing the security of wireless networks under human-centered IoT environments cannot be overemphasized. PKC uses the Read more…

Conformal Chebyshev chaoticmap-based remote user password authentication protocol using smart card

Authors : Chandrashekhar Meshram1 · Sarita Gajbhiye Meshram2 · Rabha W. Ibrahim3 · Hamid A. Jalab4 · Sajjad Shaukat Jamal5 · Sharad Kumar Barve2 Abstract : user password authentication protocols. In current ages, smartcard-based authentication protocol has formed the standard with their incredibly insubstantial, user-friendly equipment and low-cost apps. In Read more…

Combined use of Sentinel-2 and Landsat-8 to monitor water surface area and evaluated drought risk severity using Google Earth Engine

Drought is often one of environmental disasters replicated in Morocco. It is the result of climate variations and human activity that has affected different sectors (water resources, agriculture, ecology, and socio-economy, etc.). The normalized water differential index (NDWI) is a type of spectral water analysis based on one green band Read more…