Mohammed Misbahuddin

Orcid: 0000-0001-5468-3968

According to our database1, Mohammed Misbahuddin authored at least 19 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PKI-Enabled Authentication and Encryption for Enhanced Drone Communication.
Proceedings of the IEEE International Conference on Public Key Infrastructure and its Applications, 2024

2022
Identity of Things (IDoT): A Preliminary Report on Identity Management Solutions for IoT Devices.
Proceedings of the IEEE International Conference on Public Key Infrastructure and its Applications, 2022

A JSON Web Signature Based Adaptive Authentication Modality for Healthcare Applications.
Proceedings of the IEEE International Conference on Public Key Infrastructure and its Applications, 2022

2021
PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing.
J. King Saud Univ. Comput. Inf. Sci., 2021

Secure key exchange scheme: a DNA computing-based approach to resist MITM in DHKE.
Int. J. Inf. Comput. Secur., 2021

2020
A Signature-Based Mutual Authentication Protocol for Remote Health Monitoring.
SN Comput. Sci., 2020

2018
DNA Cryptography for Secure Data Storage in Cloud.
Int. J. Netw. Secur., 2018

A Strong Single Sign-on User Authentication Scheme Using Mobile Token Without Verifier Table for Cloud Based Services.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Design of a risk based authentication system using machine learning techniques.
Proceedings of the 2017 IEEE SmartWorld, 2017

An online signature method using DNA based bio-hash for positive identification and non-repudiation.
Proceedings of the 2017 International Conference on Public Key Infrastructure and its Applications, 2017

2015
A Secure Image-Based Authentication Scheme Employing DNA Crypto and Steganography.
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015

A Mobile Based Remote User Authentication Scheme without Verifier Table for Cloud Based Services.
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015

Safe Cloud: Secure and Usable Authentication Framework for Cloud Environment.
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015

2013
A Survey of Traditional and Cloud Specific Security Issues.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

2012
A Usable and Secure Two-Factor Authentication Scheme.
Inf. Secur. J. A Glob. Perspect., 2012

2010
Dynamic IDP Signature processing by fast elimination using DFA
CoRR, 2010

2008
A smart card based remote user authentication scheme.
J. Digit. Inf. Manag., 2008

Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme.
Int. J. Netw. Secur., 2008

An Image-Based Website User Authentication Mechanism Using Smart Card.
Proceedings of the 2008 International Conference on Security & Management, 2008


  Loading...