Dheerendra Mishra
Orcid: 0000-0001-8115-6397
According to our database1,
Dheerendra Mishra
authored at least 105 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Construction of post quantum secure authenticated key agreement protocol for dew-assisted IoT systems.
Int. J. Inf. Sec., February, 2025
Escrow-free and efficient dynamic anonymous privacy-preserving batch verifiable authentication scheme for VANETs.
Ad Hoc Networks, 2025
2024
Post-quantum framework for authorized and secure communication in multi-server networking.
Telecommun. Syst., October, 2024
Multim. Tools Appl., October, 2024
Trans. Emerg. Telecommun. Technol., April, 2024
Clust. Comput., April, 2024
Cryptanalysis with improvement on lattice-based authenticated key exchange protocol for mobile satellite communication networks.
Secur. Priv., 2024
Secur. Priv., 2024
J. Inf. Secur. Appl., 2024
Efficient and quantum-secure authenticated key exchange scheme for mobile satellite communication networks.
Int. J. Satell. Commun. Netw., 2024
Efficient and secure signcryption-based data aggregation for Internet of Drone-based drone-to-ground station communication.
Ad Hoc Networks, 2024
2023
Development of quantum-enhanced authenticated key agreement protocol for autonomous vehicles.
Veh. Commun., December, 2023
IEEE Trans. Veh. Technol., December, 2023
Blockchain-Based Partial Group Key Agreement Protocol for Intelligent Transportation Systems.
IEEE Trans. Veh. Technol., December, 2023
Multim. Tools Appl., November, 2023
Wirel. Pers. Commun., October, 2023
Post-quantum secure authenticated key agreement protocol for wireless sensor networks.
Telecommun. Syst., September, 2023
Peer Peer Netw. Appl., September, 2023
Int. J. Commun. Syst., August, 2023
Construction of system friendly attribute based fully distributed access control architecture for e-healthcare.
Multim. Tools Appl., July, 2023
Quantum-safe three-party lattice based authenticated key agreement protocol for mobile devices.
J. Inf. Secur. Appl., June, 2023
Wirel. Pers. Commun., 2023
Secur. Priv., 2023
On the security of ring learning with error-based key exchange protocol against signal leakage attack.
Secur. Priv., 2023
Construction of a secure and efficient content key distribution framework for DRM systems.
Int. J. Commun. Syst., 2023
FOESG: anonymous session key agreement protocol for fog assisted smart grid communication.
Int. J. Ad Hoc Ubiquitous Comput., 2023
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023
2022
Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems.
J. Supercomput., 2022
IEEE Trans. Ind. Informatics, 2022
PSSCC: Provably secure communication framework for crowdsourced industrial Internet of Things environments.
Softw. Pract. Exp., 2022
Construction of elliptic curve cryptography-based authentication protocol for internet of things.
Secur. Priv., 2022
J. Syst. Archit., 2022
Proceedings of the International Conference on Communications, 2022
Proceedings of the International Conference on Communications, 2022
2021
Privacy-Preserving Key Agreement Protocol for Fog Computing Supported Internet of Things Environment.
Wirel. Pers. Commun., 2021
Computational Efficient Authenticated Digital Content Distribution Frameworks for DRM Systems: Review and Outlook.
IEEE Syst. J., 2021
IEEE Syst. J., 2021
SFEEC: Provably Secure Signcryption-Based Big Data Security Framework for Energy-Efficient Computing Environment.
IEEE Syst. J., 2021
Cryptanalysis and improvement of biometric based content distribution framework for digital rights management systems.
Secur. Priv., 2021
Blockchain-based multimedia content distribution with the assured system update mechanism.
Multim. Tools Appl., 2021
Multim. Tools Appl., 2021
J. Medical Syst., 2021
J. Inf. Secur. Appl., 2021
A secure and efficient group signature scheme based on multivariate public key cryptography.
J. Inf. Secur. Appl., 2021
Provably secure authenticated content key distribution framework for IoT-enabled enterprise digital rights management systems.
Int. J. Ad Hoc Ubiquitous Comput., 2021
Privacy Preserving Location-based Content Distribution Framework for Digital Rights Management Systems.
Proceedings of the International Conference on Communications, 2021
2020
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing.
Veh. Commun., 2020
Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system.
Multim. Tools Appl., 2020
Efficient and Secure Attribute Based Access Control Architecture for Smart Healthcare.
J. Medical Syst., 2020
Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services - Authorized Access to Healthcare Services.
J. Medical Syst., 2020
A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party.
J. Inf. Secur. Appl., 2020
J. Inf. Secur. Appl., 2020
Authenticated content distribution framework for digital rights management systems with smart card revocation.
Int. J. Commun. Syst., 2020
LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication.
Trans. Emerg. Telecommun. Technol., 2020
Proceedings of the Machine Learning, Image Processing, Network Security and Data Sciences, 2020
2019
Inf. Technol. Control., 2019
2018
Privacy Preserving Password-Based Multi-server Authenticated Key Agreement Protocol Using Smart Card.
Wirel. Pers. Commun., 2018
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks.
Multim. Tools Appl., 2018
Provably secure biometric based authentication and key agreement protocol for wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., 2018
Efficient and secure two-factor dynamic ID-based password authentication scheme with provable security.
Cryptologia, 2018
2017
Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks.
Wirel. Pers. Commun., 2017
A Self-Verifiable Password Based Authentication Scheme for Multi-Server Architecture Using Smart Card.
Wirel. Pers. Commun., 2017
Multim. Tools Appl., 2017
J. Medical Syst., 2017
An enhanced dynamic ID-based authentication scheme for telecare medical information systems.
J. King Saud Univ. Comput. Inf. Sci., 2017
A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme.
J. Inf. Secur. Appl., 2017
An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems.
Int. J. Commun. Syst., 2017
Secure and efficient user authentication scheme for multi-gateway wireless sensor networks.
Ad Hoc Networks, 2017
2016
A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2016
Wirel. Pers. Commun., 2016
An anonymous and secure biometric-based enterprise digital rights management system for mobile environment.
Secur. Commun. Networks, 2016
A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card.
Peer-to-Peer Netw. Appl., 2016
Multim. Tools Appl., 2016
J. Inf. Secur. Appl., 2016
Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment.
Proceedings of the Information Systems Security - 12th International Conference, 2016
2015
Understanding Security Failures of Two Authentication and Key Agreement Schemes for Telecare Medicine Information Systems.
J. Medical Syst., 2015
On the Security Flaws in ID-based Password Authentication Schemes for Telecare Medical Information Systems.
J. Medical Syst., 2015
J. Inf. Secur. Appl., 2015
J. Inf. Secur. Appl., 2015
An improved biometric-based remote user authentication scheme for connected healthcare.
Int. J. Ad Hoc Ubiquitous Comput., 2015
On the security enhancement of integrated electronic patient records information systems.
Comput. Sci. Inf. Syst., 2015
Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, 2015
2014
A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014
Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce.
J. Medical Syst., 2014
Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014
Int. J. Trust. Manag. Comput. Commun., 2014
A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards.
Expert Syst. Appl., 2014
Cryptanalysis of Multi-Server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Cards and Biometrics.
CoRR, 2014
Cryptanalysis of Yang et al.'s Digital Rights Management Authentication Scheme Based on Smart Card.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014
2013
Cryptanalysis of Wu and Xu's authentication scheme for Telecare Medicine Information Systems.
CoRR, 2013
Cryptanalysis and Improvement of Jiang et al.'s Smart Card Based Remote User Authentication Scheme.
CoRR, 2013
CoRR, 2013
CoRR, 2013
The Cryptanalysis of Lee's Chaotic Maps-Based Authentication and Key Agreement Scheme using Smart card for Telecare Medicine Information Systems.
CoRR, 2013
A Certificateless Authenticated Key Agreement Protocol for Digital Rights Management System.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card.
Proceedings of the Information Systems Security - 9th International Conference, 2013
2012
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
Proceedings of the 2012 International Conference on Advances in Computing, 2012
2011
Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture.
Proceedings of the Security Aspects in Information Technology, 2011
Proceedings of the Advances in Computing and Communications, 2011