Ruhul Amin

Orcid: 0000-0002-3592-9421

Affiliations:
  • IIIT Naya Raipur, Chhattisgarh, India


According to our database1, Ruhul Amin authored at least 115 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient Certificateless Anonymous Mutual Authentication in WBANs for Smart Healthcare.
IEEE Trans. Intell. Transp. Syst., November, 2024

REPACA: Robust ECC based privacy-controlled mutual authentication and session key sharing protocol in coalmines application with provable security.
Peer Peer Netw. Appl., November, 2024

Q-Secure-P²-SMA: Quantum-Secure Privacy- Preserving Smart Meter Authentication for Unbreakable Security in Smart Grid.
IEEE Trans. Netw. Serv. Manag., October, 2024

D³APTS: Design of ECC-Based Authentication Protocol and Data Storage for Tactile Internet Enabled IoD System With Blockchain.
IEEE Trans. Consumer Electron., February, 2024

Design of Blockchain and ECC-Based Robust and Efficient Batch Authentication Protocol for Vehicular Ad-Hoc Networks.
IEEE Trans. Intell. Transp. Syst., January, 2024

S2DN: Design of robust authentication protocol with session key establishment in multi-controller based software-defined VANETs.
Veh. Commun., 2024

Autonomous vehicle security: Current survey and future research challenges.
Secur. Priv., 2024

Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions.
J. Ind. Inf. Integr., 2024

A novel approach for classification of Tor and non-Tor traffic using efficient feature selection methods.
Expert Syst. Appl., 2024

DEAC-IoT: Design of lightweight authenticated key agreement protocol for Intra and Inter-IoT device communication using ECC with FPGA implementation.
Comput. Electr. Eng., 2024

A Study on "Blockchain-Enabled Digital Twins: The Next Wave of Industrial Transformation with Future Research Challenges".
Proceedings of the International Conference on Computer, 2024

2023
Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System.
Cyber Secur. Appl., December, 2023

BSAPM: BlockChain based secured authentication protocol for large scale WSN with FPGA implementation.
Comput. Commun., September, 2023

IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication.
J. Ambient Intell. Humaniz. Comput., July, 2023

An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems.
Comput. Commun., May, 2023

Provably secured lightweight authenticated key agreement protocol for modern health industry.
Ad Hoc Networks, March, 2023

Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment.
Peer Peer Netw. Appl., January, 2023

An Unconditionally Secured Privacy-Preserving Authentication Scheme for Smart Metering Infrastructure in Smart Grid.
IEEE Trans. Netw. Sci. Eng., 2023

B-HAS: Blockchain-Assisted Efficient Handover Authentication and Secure Communication Protocol in VANETs.
IEEE Trans. Netw. Sci. Eng., 2023

Cryptanalysis and improvement of REAS-TMIS: Resource-efficient authentication scheme for telecare medical information system.
Secur. Priv., 2023

Blockchain based security protocol for device to device secure communication in internet of things networks.
Secur. Priv., 2023

Detecting and predicting countermeasures against clickjacking.
Secur. Priv., 2023

Design of secured blockchain based decentralized authentication protocol for sensor networks with auditing and accountability.
Comput. Commun., 2023

Cryptanalysis and Improvement of a Blockchain Based Lightweight Authentication and Key Agreement Scheme for Internet of Vehicles.
Proceedings of the International Conference on Communications, 2023

2022
Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation.
IEEE Trans. Veh. Technol., 2022

KL-RAP: An Efficient Key-Less RFID Authentication Protocol Based on ECDLP for Consumer Warehouse Management System.
IEEE Trans. Netw. Sci. Eng., 2022

EuDaimon: PUF-Based Robust and Lightweight Authenticated Session Key Establishment Protocol for IoT-Enabled Smart Society.
IEEE Syst. J., 2022

Decentralized trade finance using blockchain and lightning network.
Secur. Priv., 2022

Blockchain and IPFS-based reliable land registry system.
Secur. Priv., 2022

An enhanced mutually authenticated security protocol with key establishment for cloud enabled smart vehicle to grid network.
Peer-to-Peer Netw. Appl., 2022

SafeCom: Robust mutual authentication and session key sharing protocol for underwater wireless sensor networks.
J. Syst. Archit., 2022

PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey.
IEEE Internet Things J., 2022

LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment.
Int. J. Inf. Sec., 2022

A location-based multi-factor authentication scheme for mobile devices.
Int. J. Ad Hoc Ubiquitous Comput., 2022

Blockchain-based vehicular ad-hoc networks: A comprehensive survey.
Ad Hoc Networks, 2022

PortSec: Securing Port Knocking System using Sequence Mechanism in SDN Environment.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Design of Blockchain-based Secure Electric Vehicle Charging System Using ECC.
Proceedings of the International Conference on Computer, 2022

2021
Robust Authentication Protocol for Dynamic Charging System of Electric Vehicles.
IEEE Trans. Veh. Technol., 2021

An Unlinkable Authenticated Key Agreement With Collusion Resistant for VANETs.
IEEE Trans. Veh. Technol., 2021

Provably Secure and Lightweight Identity-Based Authenticated Data Sharing Protocol for Cyber-Physical Cloud Environment.
IEEE Trans. Cloud Comput., 2021

Design of Robust Mutual Authentication and Key Establishment Security Protocol for Cloud-Enabled Smart Grid Communication.
IEEE Syst. J., 2021

Blockchain-Based Internet of Things and Industrial IoT: A Comprehensive Survey.
Secur. Commun. Networks, 2021

Decentralized secure storage of medical records using Blockchain and IPFS: A comparative analysis with future directions.
Secur. Priv., 2021

Mitigating distributed denial of service attack: Blockchain and software-defined networking based approach, network model with future research challenges.
Secur. Priv., 2021

Software-Defined Network enabled Vehicle to Vehicle secured data transmission protocol in VANETs.
J. Inf. Secur. Appl., 2021

PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communication.
J. Inf. Secur. Appl., 2021

An e-healthcare authentication protocol employing cloud computing.
Int. J. Ad Hoc Ubiquitous Comput., 2021

Blockchain-Based Secured IPFS-Enable Event Storage Technique With Authentication Protocol in VANET.
IEEE CAA J. Autom. Sinica, 2021

CoMSeC++: PUF-based secured light-weight mutual authentication protocol for Drone-enabled WSN.
Comput. Networks, 2021

Design of a secure file storage and access protocol for cloud-enabled Internet of Things environment.
Comput. Electr. Eng., 2021

Blockchain Based Architecture and Solution for Secure Digital Payment System.
Proceedings of the ICC 2021, 2021

Blockchain Enabled Electronics Medical System Proposed Framework with Research Directions.
Proceedings of the International Conference on Computer, 2021

2020
Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC.
IEEE Syst. J., 2020

CFSec: Password based secure communication protocol in cloud-fog environment.
J. Parallel Distributed Comput., 2020

eUASBP: enhanced user authentication scheme based on bilinear pairing.
J. Ambient Intell. Humaniz. Comput., 2020

An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map.
J. Inf. Secur. Appl., 2020

Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism.
J. Inf. Secur. Appl., 2020

A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS.
Inf. Sci., 2020

Blockchain-based secured event-information sharing protocol in internet of vehicles for smart cities.
Comput. Electr. Eng., 2020

An enhanced anonymity resilience security protocol for vehicular ad-hoc network with Scyther simulation.
Comput. Electr. Eng., 2020

Algorithm for Multi Keyword Search Over Encrypted Data in Cloud Environment.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

2019
Design of routing protocol for multi-sink based wireless sensor networks.
Wirel. Networks, 2019

Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System.
IEEE J. Biomed. Health Informatics, 2019

Review on "Blockchain technology based medical healthcare system with privacy issues".
Secur. Priv., 2019

An overview of cloud-fog computing: Architectures, applications with security challenges.
Secur. Priv., 2019

Robust secure communication protocol for smart healthcare system with FPGA implementation.
Future Gener. Comput. Syst., 2019

A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable Function.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Ransomware Attack Protection: A Cryptographic Approach.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

A Metric Reckon Algorithm for Bit Forwarding Techniques.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2019

2018
A robust mutual authentication scheme for session initiation protocol with key establishment.
Peer-to-Peer Netw. Appl., 2018

Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks.
Multim. Tools Appl., 2018

A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication.
Multim. Tools Appl., 2018

An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks.
J. Netw. Comput. Appl., 2018

A Provably Secure Three-Factor Session Initiation Protocol for Multimedia Big Data Communications.
IEEE Internet Things J., 2018

Anonymous and expeditious mobile user authentication scheme for GLOMONET environments.
Int. J. Commun. Syst., 2018

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment.
Future Gener. Comput. Syst., 2018

A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment.
Future Gener. Comput. Syst., 2018

A robust and anonymous patient monitoring system using wireless medical sensor networks.
Future Gener. Comput. Syst., 2018

A robust mutual authentication protocol for WSN with multiple base-stations.
Ad Hoc Networks, 2018

2017
Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks.
Wirel. Pers. Commun., 2017

Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card.
Wirel. Pers. Commun., 2017

Design of authentication protocol for wireless sensor network-based smart vehicular system.
Veh. Commun., 2017

A software agent enabled biometric security algorithm for secure file access in consumer storage devices.
IEEE Trans. Consumer Electron., 2017

A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments.
Secur. Commun. Networks, 2017

A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
J. Medical Syst., 2017

An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments.
J. King Saud Univ. Comput. Inf. Sci., 2017

An enhanced bilinear pairing based authenticated key agreement protocol for multiserver environment.
Int. J. Commun. Syst., 2017

A robust ElGamal-based password-authentication protocol using smart card for client-server communication.
Int. J. Commun. Syst., 2017

An anonymous and robust multi-server authentication protocol using multiple registration servers.
Int. J. Commun. Syst., 2017

A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity.
Comput. Electr. Eng., 2017

Design of Secure and Efficient Electronic Payment System for Mobile Users.
Proceedings of the Mathematics and Computing - Third International Conference, 2017

Security on "Secure Remote Login Scheme with Password and Smart Card Update Facilities".
Proceedings of the Mathematics and Computing - Third International Conference, 2017

Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme.
Proceedings of the Mathematics and Computing - Third International Conference, 2017

2016
Security analysis and design of an efficient ECC-based two-factor password authentication scheme.
Secur. Commun. Networks, 2016

An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design.
Secur. Commun. Networks, 2016

A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.
Secur. Commun. Networks, 2016

A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.
J. Medical Syst., 2016

An Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card.
Int. J. Netw. Secur., 2016

An anonymous and provably secure authentication scheme for mobile user.
Int. J. Commun. Syst., 2016

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks.
Comput. Networks, 2016

A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks.
Ad Hoc Networks, 2016

Malicious node detection using ID-based authentication technique.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

Design of an enhanced authentication protocol and its verification using AVISPA.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

2015
Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment.
Wirel. Pers. Commun., 2015

Efficient biometric and password based mutual authentication for consumer USB mass storage devices.
IEEE Trans. Consumer Electron., 2015

An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems.
J. Medical Syst., 2015

Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
J. Medical Syst., 2015

Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.
J. Medical Syst., 2015

An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Syst., 2015

An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.
J. Medical Syst., 2015

A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.
J. Medical Syst., 2015

A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS.
J. Medical Syst., 2015

Cryptanalysis of a Markov Chain Based User Authentication Scheme.
IACR Cryptol. ePrint Arch., 2015

Secure Remote Login Scheme with Password and Smart Card Update Facilities.
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2015

An efficient remote mutual authentication scheme using smart mobile phone over insecure networks.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015


  Loading...