Ashok Kumar Das
Orcid: 0000-0002-5196-9589Affiliations:
- International Institute of Information Technology (IIIT), Center for Security, Theory and Algorithmic Research, Hyderabad, India
- Korea University, Seoul, South Korea, Department of Computer Science and Engineering, College of Informatics (2025-2026)
- Old Dominion University, Suffolk, VA 23435, USA (2022, 2024)
- International Institute of Information Technology, Bhubaneswar, India, Department of Computer Science and Engineering (2008-2010)
- Indian Institute of Technology Kharagpur, India, Department of Computer Science and Engineering (PhD, 2008)
- Centre for Development of Telematics (C-DOT), New Delhi, India (2000-2004)
According to our database1,
Ashok Kumar Das
authored at least 419 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on iiit.ac.in
-
on orkg.org
-
on orcid.org
On csauthors.net:
Bibliography
2025
Blockchain-Enabled Secure Collaborative Model Learning Using Differential Privacy for IoT-Based Big Data Analytics.
IEEE Trans. Big Data, February, 2025
Quantum-safe blockchain-assisted data encryption protocol for internet of things networks.
Clust. Comput., February, 2025
BTC2PA: A Blockchain-Assisted Trust Computation With Conditional Privacy- Preserving Authentication for Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., January, 2025
IEEE Internet Things Mag., January, 2025
A Secure Authenticated Healthcare Data Analysis Mechanism in IoMT-Enabled Healthcare.
Secur. Priv., 2025
Automotive Cybersecurity Scheme for Intrusion Detection in CAN-Driven Artificial Intelligence of Things.
Secur. Priv., 2025
A Privacy-Preserving Access Control Protocol for Consumer Flying Vehicles in Smart City Applications.
IEEE Internet Things J., 2025
A blockchain-assisted privacy-preserving signature scheme using quantum teleportation for metaverse environment in Web 3.0.
Future Gener. Comput. Syst., 2025
A deep learning ensemble approach for malware detection in Internet of Things utilizing Explainable Artificial Intelligence.
Eng. Appl. Artif. Intell., 2025
TS-PAID: A Two-Stage PUF-Based Lightweight Authentication Protocol for Internet of Drones.
IEEE Access, 2025
2024
RLBA-UAV: A Robust and Lightweight Blockchain-Based Authentication and Key Agreement Scheme for PUF-Enabled UAVs.
IEEE Trans. Intell. Transp. Syst., December, 2024
Design of Blockchain-Based Multi-Domain Authentication Protocol for Secure EV Charging Services in V2G Environments.
IEEE Trans. Intell. Transp. Syst., December, 2024
Provably Secure and Lightweight Authentication and Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks.
IEEE Trans. Intell. Transp. Syst., December, 2024
Quantum Secure Authentication Scheme for Internet of Medical Things Using Blockchain.
IEEE Internet Things J., December, 2024
A Secure Self-Certified Broadcast Authentication Protocol for Intelligent Transportation Systems in UAV-Assisted Mobile Edge Computing Environments.
IEEE Trans. Intell. Transp. Syst., November, 2024
Smart Contract-Based Access Control Scheme for Blockchain Assisted 6G-Enabled IoT-Based Big Data Driven Healthcare Cyber Physical Systems.
IEEE Trans. Consumer Electron., November, 2024
Blockchain Assisted Intra-Twin and Inter-Twin Authentication Scheme for Vehicular Digital Twin System.
IEEE Trans. Intell. Transp. Syst., October, 2024
IEEE Trans. Veh. Technol., September, 2024
Provably Secure Authentication Scheme for Fog Computing-Enabled Intelligent Social Internet of Vehicles.
IEEE Trans. Veh. Technol., September, 2024
Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment.
IEEE Trans. Intell. Transp. Syst., September, 2024
A Cost-Efficient Anonymous Authenticated and Key Agreement Scheme for V2I-Based Vehicular Ad-Hoc Networks.
IEEE Trans. Intell. Transp. Syst., September, 2024
Privacy-Preserving Electronic Medical Record Sharing for IoT-Enabled Healthcare System Using Fully Homomorphic Encryption, IOTA, and Masked Authenticated Messaging.
IEEE Trans. Ind. Informatics, September, 2024
Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage.
Clust. Comput., September, 2024
IEEE Trans. Consumer Electron., August, 2024
Big Data-Enabled Authentication Framework for Offshore Maritime Communication Using Drones.
IEEE Trans. Veh. Technol., July, 2024
IEEE Trans. Veh. Technol., July, 2024
BioKA-ASVN: Biometric-Based Key Agreement Scheme for Air Smart Vehicular Networks Using Blockchain Service.
IEEE Trans. Veh. Technol., July, 2024
An Authentication and Key Management Framework for Secure and Intelligent Transportation of Internet of Space Things.
IEEE Trans. Intell. Transp. Syst., June, 2024
A Security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones.
IEEE Internet Things J., June, 2024
PUF-Based Privacy-Preserving Simultaneous Authentication Among Multiple Vehicles in VANET.
IEEE Trans. Veh. Technol., May, 2024
Privacy-Preserving Lightweight Authentication for Location-Aware Edge-Enabled eHealth Systems.
IEEE Internet Things Mag., May, 2024
Blockchain-Based Efficient Access Control With Handover Policy in IoV-Enabled Intelligent Transportation System.
IEEE Trans. Veh. Technol., March, 2024
IEEE Internet Things Mag., March, 2024
A Security-Enhanced and Ultralightweight Communication Protocol for Internet of Medical Things.
IEEE Internet Things J., March, 2024
An Ensemble-Based Machine Learning-Envisioned Intrusion Detection in Industry 5.0-Driven Healthcare Applications.
IEEE Trans. Consumer Electron., February, 2024
Design of Blockchain and ECC-Based Robust and Efficient Batch Authentication Protocol for Vehicular Ad-Hoc Networks.
IEEE Trans. Intell. Transp. Syst., January, 2024
Role of IoT in the Ages of Digital to Smart Cities: Security Challenges and Countermeasures.
IEEE Internet Things Mag., January, 2024
Quantum Secure Threshold Private Set Intersection Protocol for IoT-Enabled Privacy-Preserving Ride-Sharing Application.
IEEE Internet Things J., January, 2024
Discret. Appl. Math., January, 2024
Digital Twins-Empowered Secure Network Slice Access and Isolation for Consumer Healthcare Applications.
IEEE Trans. Serv. Comput., 2024
ACKS-IA: An Access Control and Key Agreement Scheme for Securing Industry 4.0 Applications.
IEEE Trans. Netw. Sci. Eng., 2024
Designing access control security protocol for Industry 4.0 using Blockchain-as-a-Service.
Secur. Priv., 2024
A secure authentication protocol for remote patient monitoring in an internet-of-medical-things environment.
Secur. Priv., 2024
A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications.
Secur. Priv., 2024
Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey.
Secur. Priv., 2024
Lightweight Authenticated Key Agreement Protocol for Smart Power Grid Systems Using PUF.
IEEE Open J. Commun. Soc., 2024
Blockchain-Assisted Cross-Platform Authentication Protocol With Conditional Traceability for Metaverse Environment in Web 3.0.
IEEE Open J. Commun. Soc., 2024
ECC-EXONUM-eVOTING: A Novel Signature-Based e-Voting Scheme Using Blockchain and Zero Knowledge Property.
IEEE Open J. Commun. Soc., 2024
Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future Research.
IEEE Open J. Comput. Soc., 2024
ECC-PDGPP: ECC-Based Parallel Dependency RFID-Grouping-Proof Protocol Using Zero-Knowledge Property in the Internet of Things Environment.
IEEE Open J. Comput. Soc., 2024
Age of correlated information-optimal dynamic policy scheduling for sustainable Green IoT devices: A multi-agent deep reinforcement learning approach.
Internet Things, 2024
Robust and efficient three-factor authentication solution for WSN-based industrial IoT deployment.
Internet Things, 2024
A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact.
Cyber Secur. Appl., 2024
Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges.
Comput. Sci. Rev., 2024
Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing.
Comput. Networks, 2024
Secure Artificial Intelligence of Things (AIoT)-enabled authenticated key agreement technique for smart living environment.
Comput. Electr. Eng., 2024
Large-scale secure model learning and inference using synthetic data for IoT-based big data analytics.
Comput. Electr. Eng., 2024
Quantum safe lightweight encryption scheme for secure data sharing in Internet of Nano Things.
Comput. Electr. Eng., 2024
Efficient and secure signcryption-based data aggregation for Internet of Drone-based drone-to-ground station communication.
Ad Hoc Networks, 2024
IEEE Access, 2024
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security.
IEEE Access, 2024
A Secure and Privacy-Preserving Signature Protocol Using Quantum Teleportation in Metaverse Environment.
IEEE Access, 2024
Efficiently Learning an Encoder That Classifies Token Replacements and Masked Permuted Network-Based BIGRU Attention Classifier for Enhancing Sentiment Classification of Scientific Text.
IEEE Access, 2024
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2024
AKM-FCCI: Secure Authentication and Key Management Mechanism for Fog Computing-Based IoT-Driven Critical Infrastructure.
Proceedings of the International Wireless Communications and Mobile Computing, 2024
Proceedings of the International Wireless Communications and Mobile Computing, 2024
Designing Secure Big Data Analytics Mechanism Using Authentication for Drones-Assisted Military Applications.
Proceedings of the IEEE INFOCOM 2024, 2024
Secure Location-based Authenticated Key Establishment Scheme for Maritime Communication.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the International Conference on Communications, 2024
2023
Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System.
IEEE Trans. Intell. Transp. Syst., December, 2023
Design of blockchain-enabled secure smart health monitoring system and its testbed implementation.
Cyber Secur. Appl., December, 2023
Bilinear pairing-based access control and key agreement scheme for smart transportation.
Cyber Secur. Appl., December, 2023
Int. J. Inf. Sec., October, 2023
On the design of an AI-driven secure communication scheme for internet of medical things environment.
Digit. Commun. Networks, October, 2023
IEEE Trans. Netw. Serv. Manag., September, 2023
Robust authenticated key agreement protocol for internet of vehicles-envisioned intelligent transportation system.
J. Syst. Archit., September, 2023
A Provably Secure and Lightweight Access Control Protocol for EI-Based Vehicle to Grid Environment.
IEEE Internet Things J., September, 2023
Public Blockchain-Envisioned Security Scheme Using Post Quantum Lattice-Based Aggregate Signature for Internet of Drones Applications.
IEEE Trans. Veh. Technol., August, 2023
SUACC-IoT: secure unified authentication and access control system based on capability for IoT.
Clust. Comput., August, 2023
Internet Things, July, 2023
MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach.
Multim. Syst., June, 2023
Designing attribute-based verifiable data storage and retrieval scheme in cloud computing environment.
J. Inf. Secur. Appl., June, 2023
Private Blockchain-Based AI-Envisioned Home Monitoring Framework in IoMT-Enabled COVID-19 Environment.
IEEE Consumer Electron. Mag., May, 2023
Secure authentication protocol for home area network in smart grid-based smart cities.
Comput. Electr. Eng., May, 2023
Robust Certificateless Authentication Protocol for the SAE J1939 Commercial Vehicles Bus.
IEEE Trans. Veh. Technol., April, 2023
Blockchain-Enabled Secure Big Data Analytics for Internet of Things Smart Applications.
IEEE Internet Things J., April, 2023
LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks.
Comput. Networks, April, 2023
Security in IoT-enabled smart agriculture: architecture, security solutions and challenges.
Clust. Comput., April, 2023
ASPA-MOSN: An Efficient User Authentication Scheme for Phishing Attack Detection in Mobile Online Social Networks.
IEEE Syst. J., March, 2023
A new robust and fragile scheme based on chaotic maps and dwt for medical image security.
Multim. Tools Appl., March, 2023
A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT.
J. Syst. Archit., March, 2023
Post Quantum Lattice-Based Secure Framework using Aggregate Signature for Ambient Intelligence Assisted Blockchain-Based IoT Applications.
IEEE Internet Things Mag., March, 2023
SINN-RD: Spline interpolation-envisioned neural network-based ransomware detection scheme.
Comput. Electr. Eng., March, 2023
A Provably Secure Mobile User Authentication Scheme for Big Data Collection in IoT-Enabled Maritime Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., February, 2023
BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare.
IEEE Trans. Consumer Electron., February, 2023
Post-Quantum Lattice-Based Secure Reconciliation Enabled Key Agreement Protocol for IoT.
IEEE Internet Things J., February, 2023
Mobile-Chain: Secure blockchain based decentralized authentication system for global roaming in mobility networks.
Comput. Commun., February, 2023
Securing Age-of-Information (AoI)-Enabled 5G Smart Warehouse Using Access Control Scheme.
IEEE Internet Things J., January, 2023
Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023
AISCM-FH: AI-Enabled Secure Communication Mechanism in Fog Computing-Based Healthcare.
IEEE Trans. Inf. Forensics Secur., 2023
Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks.
IEEE Trans. Inf. Forensics Secur., 2023
BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments.
IEEE Trans. Dependable Secur. Comput., 2023
Sensors, 2023
Explainable artificial intelligence envisioned security mechanism for cyber threat hunting.
Secur. Priv., 2023
A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges.
Secur. Priv., 2023
IEEE Open J. Commun. Soc., 2023
Efficient Personal-Health-Records Sharing in Internet of Medical Things Using Searchable Symmetric Encryption, Blockchain, and IPFS.
IEEE Open J. Commun. Soc., 2023
Provably secure public key encryption with keyword search for data outsourcing in cloud environments.
J. Syst. Archit., 2023
Fog-Based Single Sign-On Authentication Protocol for Electronic Healthcare Applications.
IEEE Internet Things J., 2023
IIDS: Design of Intelligent Intrusion Detection System for Internet-of-Things Applications.
CoRR, 2023
Provably secure signature-based anonymous user authentication protocol in an Internet of Things-enabled intelligent precision agricultural environment.
Concurr. Comput. Pract. Exp., 2023
A hybrid ensemble machine learning model for detecting APT attacks based on network behavior anomaly detection.
Concurr. Comput. Pract. Exp., 2023
Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment.
Comput. Commun., 2023
Design of Robust Blockchain-Envisioned Authenticated Key Management Mechanism for Smart Healthcare Applications.
IEEE Access, 2023
An Efficient Lightweight Provably Secure Authentication Protocol for Patient Monitoring Using Wireless Medical Sensor Networks.
IEEE Access, 2023
An Effective Privacy-Preserving Blockchain-Assisted Security Protocol for Cloud-Based Digital Twin Environment.
IEEE Access, 2023
Design of Secure and Lightweight Authentication Scheme for UAV-Enabled Intelligent Transportation Systems Using Blockchain and PUF.
IEEE Access, 2023
Private Blockchain Envisioned Access Control System for Securing Industrial IoT-Based Pervasive Edge Computing.
IEEE Access, 2023
Blockchain Integration for IoT-Enabled V2X Communications: A Comprehensive Survey, Security Issues and Challenges.
IEEE Access, 2023
IEEE Access, 2023
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Embattle The Security of E-Health System Through A Secure Authentication and Key Agreement Protocol.
Proceedings of the International Wireless Communications and Mobile Computing, 2023
Securing Fog Computing-based Industry 4.0 Communication Using Authenticated Key Agreement Scheme.
Proceedings of the International Wireless Communications and Mobile Computing, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
An Efficient and Secure Post-Quantum Multi-Authority Ciphertext-Policy Attribute-Based Encryption Method Using Lattice.
Proceedings of the IEEE INFOCOM 2023, 2023
Multiclass Classification Approaches for Intrusion Detection in IoT-Driven Aerial Computing Environment.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the International Conference on Computer, 2023
SLA-SCA: Secure and Lightweight Authentication and Key Agreement Mechanism for Smart City Applications.
Proceedings of the International Conference on Communications, 2023
Proceedings of the International Conference on Communications, 2023
2022
SLAP-IoD: Secure and Lightweight Authentication Protocol Using Physical Unclonable Functions for Internet of Drones in Smart City Environments.
IEEE Trans. Veh. Technol., 2022
Blockchain-Envisioned Provably Secure Multivariate Identity-Based Multi-Signature Scheme for Internet of Vehicles Environment.
IEEE Trans. Veh. Technol., 2022
Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET.
IEEE Trans. Netw. Sci. Eng., 2022
EV-PUF: Lightweight Security Protocol for Dynamic Charging System of Electric Vehicles Using Physical Unclonable Functions.
IEEE Trans. Netw. Sci. Eng., 2022
KL-RAP: An Efficient Key-Less RFID Authentication Protocol Based on ECDLP for Consumer Warehouse Management System.
IEEE Trans. Netw. Sci. Eng., 2022
Authenticated Key Agreement Scheme With User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical Systems.
IEEE Trans. Intell. Transp. Syst., 2022
Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions.
Telecommun. Syst., 2022
IEEE Trans. Cloud Comput., 2022
Security in IoMT-driven smart healthcare: A comprehensive review and open challenges.
Secur. Priv., 2022
Chaotic neural networks and farfalle construction based parallel keyed secure hash function.
Secur. Priv., 2022
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system.
J. Syst. Archit., 2022
DDoS attack resisting authentication protocol for mobile based online social network applications.
J. Inf. Secur. Appl., 2022
TACAS-IoT: Trust Aggregation Certificate-Based Authentication Scheme for Edge-Enabled IoT Systems.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
An Efficient Privacy-Preserving Authenticated Key Establishment Protocol for Health Monitoring in Industrial Cyber-Physical Systems.
IEEE Internet Things J., 2022
PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey.
IEEE Internet Things J., 2022
AI-Envisioned Blockchain-Enabled Signature-Based Key Management Scheme for Industrial Cyber-Physical Systems.
IEEE Internet Things J., 2022
Designing Fine-Grained Access Control for Software-Defined Networks Using Private Blockchain.
IEEE Internet Things J., 2022
Access Control Protocol for Battlefield Surveillance in Drone-Assisted IoT Environment.
IEEE Internet Things J., 2022
Uniting cyber security and machine learning: Advantages, challenges and future research.
ICT Express, 2022
Blockchain-enabled secure communication mechanism for IoT-driven personal health records.
Trans. Emerg. Telecommun. Technol., 2022
Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for IoT applications.
Trans. Emerg. Telecommun. Technol., 2022
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment.
Comput. Stand. Interfaces, 2022
Signed interval graphs and bigraphs: A generalization of interval graphs and bigraphs.
CoRR, 2022
Machine learning security attacks and defense approaches for emerging cyber physical applications: A comprehensive survey.
Comput. Commun., 2022
Towards achieving efficient access control of medical data with both forward and backward secrecy.
Comput. Commun., 2022
Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system.
Comput. Commun., 2022
Ad Hoc Networks, 2022
ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things.
IEEE Access, 2022
Healthcare 5.0 Security Framework: Applications, Issues and Future Research Directions.
IEEE Access, 2022
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022
BAKP-IoDA: blockchain driven authentication and key agreement protocol for internet of drones based applications.
Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2022
BDESF-ITS: Blockchain-Based Secure Data Exchange and Storage Framework for Intelligent Transportation System.
Proceedings of the IEEE INFOCOM 2022, 2022
2021
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT.
Wirel. Networks, 2021
IEEE Trans. Veh. Technol., 2021
Block-CLAP: Blockchain-Assisted Certificateless Key Agreement Protocol for Internet of Vehicles in Smart Transportation.
IEEE Trans. Veh. Technol., 2021
On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System.
IEEE Trans. Veh. Technol., 2021
Secure and Efficient Honey List-Based Authentication Protocol for Vehicular Ad Hoc Networks.
IEEE Trans. Netw. Sci. Eng., 2021
Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications.
IEEE Trans. Ind. Informatics, 2021
Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems.
IEEE Trans. Ind. Informatics, 2021
SFEEC: Provably Secure Signcryption-Based Big Data Security Framework for Energy-Efficient Computing Environment.
IEEE Syst. J., 2021
SDN-chain: Privacy-preserving protocol for software defined networks using blockchain.
Secur. Priv., 2021
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters.
J. Syst. Archit., 2021
J. Syst. Archit., 2021
Secure Communication Framework for Blockchain-Based Internet of Drones-Enabled Aerial Computing Deployment.
IEEE Internet Things Mag., 2021
AI and Blockchain-Based Cloud-Assisted Secure Vaccine Distribution and Tracking in IoMT-Enabled COVID-19 Environment.
IEEE Internet Things Mag., 2021
Securing Internet of Drones Networks Using AI-Envisioned Smart-Contract-Based Blockchain.
IEEE Internet Things Mag., 2021
Search on Encrypted COVID-19 Healthcare Data in Blockchain-Assisted Distributed Cloud Storage.
IEEE Internet Things Mag., 2021
IEEE Internet Things J., 2021
Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System.
IEEE Internet Things J., 2021
Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Internet Things, 2021
Software-defined networking security for private data center networks and clouds: Vulnerabilities, attacks, countermeasures, and solutions.
Int. J. Commun. Syst., 2021
Consortium blockchain-enabled access control mechanism in edge computing based generic Internet of Things environment.
Trans. Emerg. Telecommun. Technol., 2021
An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network.
Comput. Commun., 2021
Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment.
Comput. Commun., 2021
Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT.
Comput. Commun., 2021
AI-Enabled Blockchain-Based Access Control for Malicious Attacks Detection and Mitigation in IoE.
IEEE Consumer Electron. Mag., 2021
Comments on "ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes".
IEEE Access, 2021
Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap.
IEEE Access, 2021
On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks.
IEEE Access, 2021
iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment.
IEEE Access, 2021
On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure.
IEEE Access, 2021
Design and Testbed Experiments of Public Blockchain-Based Security Framework for IoT-Enabled Drone-Assisted Wildlife Monitoring.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
SPCS-IoTEH: Secure Privacy-Preserving Communication Scheme for IoT-Enabled e-Health Applications.
Proceedings of the ICC 2021, 2021
2020
On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment.
IEEE Trans. Veh. Technol., 2020
Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment.
IEEE Trans. Veh. Technol., 2020
J. Supercomput., 2020
Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment.
IEEE Trans. Ind. Informatics, 2020
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment.
IEEE Trans. Dependable Secur. Comput., 2020
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment.
Sensors, 2020
An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments.
Sensors, 2020
On the design of biometric-based user authentication protocol in smart city environment.
Pattern Recognit. Lett., 2020
J. Netw. Comput. Appl., 2020
Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment.
J. Inf. Secur. Appl., 2020
Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment.
IEEE Internet Things J., 2020
Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems.
Future Gener. Comput. Syst., 2020
Design of a blind quantization-based audio watermarking scheme using singular value decomposition.
Concurr. Comput. Pract. Exp., 2020
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment.
Comput. Commun., 2020
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT.
Comput. Networks, 2020
IoV-SMAP: Secure and Efficient Message Authentication Protocol for IoV in Smart City Environment.
IEEE Access, 2020
A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things.
IEEE Access, 2020
Design of Secure Authentication Protocol for Cloud-Assisted Telecare Medical Information System Using Blockchain.
IEEE Access, 2020
Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges.
IEEE Access, 2020
LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things.
IEEE Access, 2020
On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks.
IEEE Access, 2020
BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment.
IEEE Access, 2020
Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges.
IEEE Access, 2020
Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services.
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020
On the Design of Secure Communication Framework for Blockchain-Based Internet of Intelligent Battlefield Things Environment.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
On the Design of Blockchain-Based Access Control Scheme for Software Defined Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
On the Design of Blockchain-Based Access Control Protocol for IoT-Enabled Healthcare Applications.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Cache Poisoning Prevention Scheme in 5G-enabled Vehicular Networks: A Tangle-based Theoretical Perspective.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
2019
TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment.
IEEE Trans. Veh. Technol., 2019
Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications.
IEEE Trans. Ind. Informatics, 2019
ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System.
IEEE Trans. Ind. Informatics, 2019
Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2019
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
Sensors, 2019
User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions.
Pervasive Mob. Comput., 2019
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment.
Mob. Networks Appl., 2019
J. Syst. Archit., 2019
A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment.
J. Ambient Intell. Humaniz. Comput., 2019
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications.
ISC Int. J. Inf. Secur., 2019
Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment.
IEEE Internet Things J., 2019
AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment.
IEEE Internet Things J., 2019
RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment.
Int. J. Commun. Syst., 2019
Design of secure key management and user authentication scheme for fog computing services.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
IEEE Consumer Electron. Mag., 2019
IEEE Access, 2019
A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things.
IEEE Access, 2019
A Mean Quantization Watermarking Scheme for Audio Signals Using Singular-Value Decomposition.
IEEE Access, 2019
Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment.
IEEE Access, 2019
Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions.
IEEE Access, 2019
Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019
On the Design of a Secure Anonymous User Authentication Scheme for Multiple Base Stations Based Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019
2018
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Smart Grid, 2018
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers.
J. Supercomput., 2018
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.
IEEE J. Biomed. Health Informatics, 2018
Providing Healthcare-as-a-Service Using Fuzzy Rule Based Big Data Analytics in Cloud Computing.
IEEE J. Biomed. Health Informatics, 2018
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
IEEE J. Biomed. Health Informatics, 2018
A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks.
Telecommun. Syst., 2018
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment.
IEEE Trans. Dependable Secur. Comput., 2018
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multim. Tools Appl., 2018
J. Netw. Comput. Appl., 2018
A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications.
J. Ambient Intell. Humaniz. Comput., 2018
Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography.
J. Ambient Intell. Humaniz. Comput., 2018
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks.
IEEE Internet Things J., 2018
IEEE Internet Things J., 2018
Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things.
IEEE Internet Things J., 2018
Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment.
IEEE Internet Things J., 2018
On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC.
Int. J. Commun. Syst., 2018
A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor.
Int. J. Ad Hoc Ubiquitous Comput., 2018
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks.
IACR Cryptol. ePrint Arch., 2018
Future Gener. Comput. Syst., 2018
A new two-server authentication and key agreement protocol for accessing secure cloud services.
Comput. Networks, 2018
LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment.
IEEE Commun. Mag., 2018
SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment.
IEEE Commun. Mag., 2018
Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions.
IEEE Consumer Electron. Mag., 2018
Comput. Electr. Eng., 2018
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks.
Comput. Electr. Eng., 2018
2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment.
IEEE Access, 2018
HEAP: An Efficient and Fault-Tolerant Authentication and Key Exchange Protocol for Hadoop-Assisted Big Data Platform.
IEEE Access, 2018
IEEE Access, 2018
Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks.
IEEE Access, 2018
LaCSys: Lattice-Based Cryptosystem for Secure Communication in Smart Grid Environment.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the Algorithms and Discrete Applied Mathematics, 2018
2017
A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks.
Wirel. Pers. Commun., 2017
A Multi-server Environment with Secure and Efficient Remote User Authentication Scheme Based on Dynamic ID Using Smart Cards.
Wirel. Pers. Commun., 2017
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017
A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks.
Wirel. Pers. Commun., 2017
Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment.
IEEE Trans. Ind. Informatics, 2017
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Netw. Comput. Appl., 2017
Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment.
IEEE Internet Things J., 2017
Robust Anonymous Mutual Authentication Scheme for n-Times Ubiquitous Mobile Cloud Computing Services.
IEEE Internet Things J., 2017
A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor.
Int. J. Commun. Syst., 2017
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services.
Future Gener. Comput. Syst., 2017
Design of a provably secure biometrics-based multi-cloud-server authentication scheme.
Future Gener. Comput. Syst., 2017
Discret. Appl. Math., 2017
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment.
Comput. Stand. Interfaces, 2017
On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2017
Comput. Electr. Eng., 2017
An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks.
Ann. des Télécommunications, 2017
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks.
IEEE Access, 2017
On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services.
IEEE Access, 2017
Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks.
IEEE Access, 2017
Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts.
IEEE Access, 2017
Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices.
IEEE Access, 2017
On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems.
IEEE Access, 2017
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications.
IEEE Access, 2017
Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment.
IEEE Access, 2017
2016
An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks.
Wirel. Pers. Commun., 2016
A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2016
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
Wirel. Pers. Commun., 2016
SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms.
IEEE Trans. Consumer Electron., 2016
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks.
Secur. Commun. Networks, 2016
Provably secure biometric-based user authentication and key agreement scheme in cloud computing.
Secur. Commun. Networks, 2016
Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS.
Secur. Commun. Networks, 2016
Design of sinkhole node detection mechanism for hierarchical wireless sensor networks.
Secur. Commun. Networks, 2016
Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography.
Secur. Commun. Networks, 2016
An anonymous and secure biometric-based enterprise digital rights management system for mobile environment.
Secur. Commun. Networks, 2016
An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks.
Secur. Commun. Networks, 2016
A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks.
Secur. Commun. Networks, 2016
Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor.
Secur. Commun. Networks, 2016
Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks.
Secur. Commun. Networks, 2016
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.
Secur. Commun. Networks, 2016
Provably secure user authentication and key agreement scheme for wireless sensor networks.
Secur. Commun. Networks, 2016
Provably secure three-factor authentication and key agreement scheme for session initiation protocol.
Secur. Commun. Networks, 2016
A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card.
Peer-to-Peer Netw. Appl., 2016
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks.
Peer-to-Peer Netw. Appl., 2016
Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2016
A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system.
J. King Saud Univ. Comput. Inf. Sci., 2016
KSII Trans. Internet Inf. Syst., 2016
An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards.
KSII Trans. Internet Inf. Syst., 2016
J. Inf. Secur. Appl., 2016
A secure and efficient time-bound hierarchical access control scheme for secure broadcasting.
Int. J. Ad Hoc Ubiquitous Comput., 2016
Lightweight authentication with key-agreement protocol for mobile network environment using smart cards.
IET Inf. Secur., 2016
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps.
Future Gener. Comput. Syst., 2016
Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.
Comput. Methods Programs Biomed., 2016
Secure anonymous mutual authentication for star two-tier wireless body area networks.
Comput. Methods Programs Biomed., 2016
Appl. Intell., 2016
A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography.
IEEE Access, 2016
An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016
Proceedings of the Theoretical Computer Science and Discrete Mathematics, 2016
2015
Wirel. Pers. Commun., 2015
An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems.
Wirel. Pers. Commun., 2015
DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks.
Wirel. Pers. Commun., 2015
A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks.
Wirel. Pers. Commun., 2015
IEEE Trans. Inf. Forensics Secur., 2015
An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards.
Secur. Commun. Networks, 2015
A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks.
Secur. Commun. Networks, 2015
An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks.
Secur. Commun. Networks, 2015
Knowl. Inf. Syst., 2015
A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.
J. Medical Syst., 2015
A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems.
J. Medical Syst., 2015
A Secure and Robust Password-Based Remote User Authentication Scheme Using Smart Cards for the Integrated EPR Information System.
J. Medical Syst., 2015
A robust anonymous biometric-based remote user authentication scheme using smart cards.
J. King Saud Univ. Comput. Inf. Sci., 2015
An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card.
J. Inf. Secur. Appl., 2015
J. Inf. Secur. Appl., 2015
An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks.
Int. J. Commun. Networks Distributed Syst., 2015
A secure and effective access control scheme for distributed wireless sensor networks.
Int. J. Commun. Networks Distributed Syst., 2015
An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices.
IACR Cryptol. ePrint Arch., 2015
Expert Syst. Appl., 2015
A New Biometric-Based Remote User Authentication Scheme in Hierarchical Wireless Body Area Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2015
Proceedings of the Algorithms and Discrete Applied Mathematics, 2015
2014
An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function.
J. Medical Syst., 2014
A novel and efficient user access control scheme for wireless body area sensor networks.
J. King Saud Univ. Comput. Inf. Sci., 2014
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy.
Inf. Sci., 2014
Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks.
Int. J. Trust. Manag. Comput. Commun., 2014
A survey on user access control in wireless sensor networks with formal security verification.
Int. J. Trust. Manag. Comput. Commun., 2014
An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function.
Int. J. Commun. Networks Distributed Syst., 2014
Cryptanalysis on 'Robust Biometrics-Based Authentication Scheme for Multi-server Environment'.
IACR Cryptol. ePrint Arch., 2014
On the Security of 'An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'.
IACR Cryptol. ePrint Arch., 2014
A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards.
Expert Syst. Appl., 2014
Ad Hoc Sens. Wirel. Networks, 2014
Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications, 2014
Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications, 2014
2013
Smart Comput. Rev., 2013
An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System.
J. Medical Syst., 2013
A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care.
J. Medical Syst., 2013
An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System.
J. Medical Syst., 2013
J. King Saud Univ. Comput. Inf. Sci., 2013
A novel linear polynomial-based dynamic key management scheme for hierarchical access control.
Int. J. Trust. Manag. Comput. Commun., 2013
A Novel Efficient Access Control Scheme for Large-Scale Distributed Wireless Sensor Networks.
Int. J. Found. Comput. Sci., 2013
Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function.
Proceedings of the Security in Computing and Communications - International Symposium, 2013
Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications - International Symposium, 2013
LHSC: An effective dynamic key management scheme for linear hierarchical access control.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013
A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
2012
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks.
J. Netw. Comput. Appl., 2012
Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem.
Inf. Sci., 2012
Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks.
Int. J. Netw. Secur., 2012
A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks.
Int. J. Inf. Sec., 2012
A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
2011
An efficient random key distribution scheme for large-scale distributed sensor networks.
Secur. Commun. Networks, 2011
An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks.
J. Comput., 2011
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards.
IET Inf. Secur., 2011
A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge
CoRR, 2011
An Unconditionally Secure Key Management Scheme for Large-Scale Heterogeneous Wireless Sensor Networks
CoRR, 2011
An Improved Efficient Key Distribution Mechanism for Large-Scale Heterogeneous Mobile Sensor Networks
CoRR, 2011
Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards
CoRR, 2011
2009
A Location-Adaptive Key Establishment Scheme for Large-Scale Distributed Wireless Sensor Networks.
J. Comput., 2009
2008
Int. J. Netw. Secur., 2008
An Identity-ased Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks.
Int. J. Netw. Secur., 2008
An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008
2007
Proceedings of the Distributed Computing and Internet Technology, 2007
2006
A bidirectional linear semi-systolic architecture for DCT-domain image resizing processor.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006
2005
Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks.
Proceedings of the Distributed Computing, 2005
Proceedings of the Information Systems Security, First International Conference, 2005