Saru Kumari
Orcid: 0000-0003-4929-5383
According to our database1,
Saru Kumari
authored at least 297 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., December, 2024
Blockchain and Machine Learning Integrated Secure Driver Behavior Centric Electric Vehicle Insurance Model.
IEEE Trans. Intell. Transp. Syst., November, 2024
IEEE Internet Things J., October, 2024
IEEE Trans. Intell. Transp. Syst., September, 2024
Traceable Attribute-Based Encryption With Equality Test for Cloud Enabled E-Health System.
IEEE J. Biomed. Health Informatics, September, 2024
Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment.
IEEE Internet Things J., July, 2024
An AR-Based Meta Vehicle Road Cooperation Testing Systems: Framework, Components Modeling, and an Implementation Example.
IEEE Internet Things J., July, 2024
Transferability of Adversarial Attacks on Tiny Deep Learning Models for IoT Unmanned Aerial Vehicles.
IEEE Internet Things J., June, 2024
Efficient plaintext checkable identity-based signcryption in cyber-physical systems towards IIoT.
Trans. Emerg. Telecommun. Technol., June, 2024
On the Security of a Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks.
Wirel. Pers. Commun., May, 2024
A Privacy-Preserving Authentication Protocol for Electric Vehicle Battery Swapping Based on Intelligent Blockchain.
IEEE Internet Things J., May, 2024
Trans. Emerg. Telecommun. Technol., April, 2024
Trans. Emerg. Telecommun. Technol., April, 2024
Privacy preserving support vector machine based on federated learning for distributed IoT-enabled data analysis.
Comput. Intell., April, 2024
Sustainable Secure Communication in Consumer-Centric Electric Vehicle Charging in Industry 5.0 Environments.
IEEE Trans. Consumer Electron., February, 2024
IEEE Internet Things J., February, 2024
Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures.
J. Supercomput., January, 2024
Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures.
J. Supercomput., January, 2024
An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring.
J. Ambient Intell. Humaniz. Comput., January, 2024
Practical Feature Inference Attack in Vertical Federated Learning During Prediction in Artificial Internet of Things.
IEEE Internet Things J., January, 2024
Finger pinching and imagination classification: A fusion of CNN architectures for IoMT-enabled BCI applications.
Inf. Fusion, January, 2024
ERLNEIL-MDP: Evolutionary reinforcement learning with novelty-driven exploration for medical data processing.
Swarm Evol. Comput., 2024
Flaw and amendment of Dharminder et al.'s authentication protocol for satellite communication.
Secur. Priv., 2024
A trustworthy data collection approach from sensor nodes using trust score of mobile vehicles for smart city.
Secur. Priv., 2024
On the security of a novel privacy-preserving authentication scheme for V2G networks.
Secur. Priv., 2024
Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system.
J. Syst. Archit., 2024
Industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training.
J. Ind. Inf. Integr., 2024
SL3PAKE: Simple Lattice-based Three-party Password Authenticated Key Exchange for post-quantum world.
J. Inf. Secur. Appl., 2024
A lightweight BRLWE-based post-quantum cryptosystem with side-channel resilience for IoT security.
Internet Things, 2024
Cross-modal interaction and multi-source visual fusion for video generation in fetal cardiac screening.
Inf. Fusion, 2024
Digital twin-assisted service function chaining in multi-domain computing power networks with multi-agent reinforcement learning.
Future Gener. Comput. Syst., 2024
Proxy re-encryption with plaintext checkable encryption for integrating digital twins into IIoT.
Comput. Electr. Eng., 2024
Secure personal-health-records searching in edge-based Internet of Medical Things through plaintext checkable encryption.
Comput. Electr. Eng., 2024
Pairing-free certificateless public key encryption with equality test for Internet of Vehicles.
Comput. Electr. Eng., 2024
Decoding the third dimension in the metaverse: A comprehensive method for reconstructing 2D NFT portraits into 3D models.
Appl. Soft Comput., 2024
Towards classification and comprehensive analysis of AI-based COVID-19 diagnostic techniques: A survey.
Artif. Intell. Medicine, 2024
2023
PRS-HDMC: An online participant recruitment scheme for vehicular crowdsensing-enabled HD map collection.
Internet Things, December, 2023
Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture.
EURASIP J. Wirel. Commun. Netw., December, 2023
IEEE Trans. Intell. Transp. Syst., November, 2023
Trans. Emerg. Telecommun. Technol., November, 2023
Peer Peer Netw. Appl., August, 2023
An efficient certificateless key exchange protocol for heterogeneous networks in human-centered IoT systems.
Int. J. Commun. Syst., August, 2023
Comput. Networks, April, 2023
Fog-based low latency and lightweight authentication protocol for vehicular communication.
Peer Peer Netw. Appl., March, 2023
Enhanced privacy-preserving in student certificate management in blockchain and interplanetary file system.
Multim. Tools Appl., March, 2023
A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment.
Veh. Commun., February, 2023
DisBezant: Secure and Robust Federated Learning Against Byzantine Attack in IoT-Enabled MTS.
IEEE Trans. Intell. Transp. Syst., February, 2023
IEEE Internet Things J., February, 2023
A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication.
Trans. Emerg. Telecommun. Technol., January, 2023
A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment.
IEEE Trans. Netw. Sci. Eng., 2023
Secur. Priv., 2023
An energy and time-saving task scheduling algorithm for UAV-IoT collaborative system.
Microprocess. Microsystems, 2023
J. Ambient Intell. Humaniz. Comput., 2023
J. Ambient Intell. Humaniz. Comput., 2023
Concurr. Comput. Pract. Exp., 2023
2022
Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing.
ACM Trans. Internet Techn., 2022
A provably secure lightweight authentication protocol in mobile edge computing environments.
J. Supercomput., 2022
A lightweight authentication and key agreement protocol for heterogeneous IoT with special attention to sensing devices and gateway.
J. Supercomput., 2022
AFFIRM: Provably Forward Privacy for Searchable Encryption in Cooperative Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2022
Personalized Privacy-Aware Task Offloading for Edge-Cloud-Assisted Industrial Internet of Things in Automated Manufacturing.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
SAKE*: A Symmetric Authenticated Key Exchange Protocol With Perfect Forward Secrecy for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022
Telecommun. Syst., 2022
Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices.
IEEE Trans. Dependable Secur. Comput., 2022
Symmetry, 2022
Efficient Unbounded Fully Attribute Hiding Inner Product Encryption in Cloud-Aided WBANs.
IEEE Syst. J., 2022
IEEE Syst. J., 2022
Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments.
Sensors, 2022
Sensors, 2022
An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT.
Sensors, 2022
Sensors, 2022
Peer-to-Peer Netw. Appl., 2022
Predicting airline customers' recommendations using qualitative and quantitative contents of online reviews.
Multim. Tools Appl., 2022
Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Int. J. Inf. Comput. Secur., 2022
Int. J. Commun. Syst., 2022
Smart sensors in vehicular communication networks: Principles, algorithms, systems and applications.
Int. J. Commun. Syst., 2022
Energy-efficient fog computing in Internet of Things based on Routing Protocol for Low-Power and Lossy Network with Contiki.
Int. J. Commun. Syst., 2022
Proxy re-encryption with equality test for secure data sharing in Internet of Things-based healthcare systems.
Trans. Emerg. Telecommun. Technol., 2022
Digit. Commun. Networks, 2022
Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment.
IEEE Consumer Electron. Mag., 2022
Guest editorial: Introduction to the special section on sustainable security solutions for Internet of Vehicles (VSI-iov).
Comput. Electr. Eng., 2022
Comput. Electr. Eng., 2022
A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios.
Proceedings of the Information Security Practice and Experience, 2022
2021
On the Security of "Secure and Lightweight Authentication with Key Agreement for Smart Wearable Systems".
Wirel. Pers. Commun., 2021
Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services.
Wirel. Pers. Commun., 2021
Wirel. Commun. Mob. Comput., 2021
IEEE Trans. Intell. Transp. Syst., 2021
Voice-Transfer Attacking on Industrial Voice Control Systems in 5G-Aided IIoT Domain.
IEEE Trans. Ind. Informatics, 2021
Telecommun. Syst., 2021
A Novel Multiserver Authentication Scheme Using Proxy Resignature With Scalability and Strong User Anonymity.
IEEE Syst. J., 2021
Comments on "Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC".
IEEE Syst. J., 2021
Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV.
IEEE Syst. J., 2021
Comment on "Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication".
IEEE Syst. J., 2021
LBA-PAKE: Lattice-Based Anonymous Password Authenticated Key Exchange for Mobile Devices.
IEEE Syst. J., 2021
Secur. Commun. Networks, 2021
Peer-to-Peer Netw. Appl., 2021
J. Netw. Comput. Appl., 2021
An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System.
J. Medical Syst., 2021
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT).
J. Inf. Secur. Appl., 2021
Flaw and amendment of a two-party authenticated key agreement protocol for post-quantum environments.
J. Inf. Secur. Appl., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen Key Attacks for Industrial Internet of Things.
IEEE Internet Things J., 2021
Certain investigations on recent advances in the design of decoding algorithms using low-density parity-check codes and its applications.
Int. J. Commun. Syst., 2021
SEBAP: A secure and efficient biometric-assisted authentication protocol using ECC for vehicular cloud computing.
Int. J. Commun. Syst., 2021
Smart workload migration on external cloud service providers to minimize delay, running time, and transfer cost.
Int. J. Commun. Syst., 2021
IACR Cryptol. ePrint Arch., 2021
Trans. Emerg. Telecommun. Technol., 2021
Post quantum secure conditional privacy preserving authentication for edge based vehicular communication.
Trans. Emerg. Telecommun. Technol., 2021
Trans. Emerg. Telecommun. Technol., 2021
Enterp. Inf. Syst., 2021
Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology.
Digit. Commun. Networks, 2021
A Technical Report for Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment.
CoRR, 2021
Transfer reinforcement learning-based road object detection in next generation IoT domain.
Comput. Networks, 2021
Sentiment analysis of tweets using a unified convolutional neural network-long short-term memory network model.
Comput. Intell., 2021
Appl. Intell., 2021
IEEE Access, 2021
Practical Identity Based Online/Off-Line Signcryption Scheme for Secure Communication in Internet of Things.
IEEE Access, 2021
Proceedings of the International Semantic Intelligence Conference 2021 (ISIC 2021), 2021
2020
Comments on "A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things".
Wirel. Pers. Commun., 2020
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing.
Veh. Commun., 2020
An approach for solving fully fuzzy multi-objective linear fractional optimization problems.
Soft Comput., 2020
Secur. Commun. Networks, 2020
Secur. Commun. Networks, 2020
A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments.
Peer-to-Peer Netw. Appl., 2020
An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure.
J. Sensors, 2020
J. Inf. Secur. Appl., 2020
A provably secure ECC-based roaming authentication scheme for global mobility networks.
J. Inf. Secur. Appl., 2020
Fuzzy extraction and PUF based three party authentication protocol using USB as mass storage device.
J. Inf. Secur. Appl., 2020
Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT.
IEEE Internet Things J., 2020
Comments on "AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment".
IEEE Internet Things J., 2020
Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0".
IEEE Internet Things J., 2020
Int. J. Inf. Sec., 2020
A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things.
Int. J. Commun. Syst., 2020
Int. J. Commun. Syst., 2020
A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs.
Int. J. Commun. Syst., 2020
Gateway-oriented two-server password authenticated key exchange protocol for unmanned aerial vehicles in mobile edge computing.
IET Commun., 2020
Hum. centric Comput. Inf. Sci., 2020
Future Gener. Comput. Syst., 2020
Frontiers Comput. Sci., 2020
An efficient certificateless aggregate signature scheme for the Internet of Vehicles.
Trans. Emerg. Telecommun. Technol., 2020
Comput. Secur., 2020
Comput. Secur., 2020
Comput. Commun., 2020
Comput. Commun., 2020
Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain.
Comput. Electr. Eng., 2020
An anonymous and identity-trackable data transmission scheme for smart grid under smart city notion.
Ann. des Télécommunications, 2020
IEEE Access, 2020
A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments.
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid.
IEEE Access, 2020
Lightweight Authentication Protocol for NFC Based Anti-Counterfeiting System in IoT Infrastructure.
IEEE Access, 2020
A Lightweight Key Agreement and Authentication Scheme for Satellite-Communication Systems.
IEEE Access, 2020
Anonymous Key-Agreement Protocol for V2G Environment Within Social Internet of Vehicles.
IEEE Access, 2020
2019
Optimality criteria for fuzzy-valued fractional multi-objective optimization problem.
Soft Comput., 2019
Duality-based branch-bound computational algorithm for sum-of-linear-fractional multi-objective optimization problem.
Soft Comput., 2019
A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography.
IEEE Syst. J., 2019
An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre.
IEEE Syst. J., 2019
Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks.
Sensors, 2019
Multimodal data modeling for efficiency assessment of social priority based urban bus route transportation system using GIS and data envelopment analysis.
Multim. Tools Appl., 2019
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment.
Mob. Networks Appl., 2019
J. Parallel Distributed Comput., 2019
AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities.
J. Netw. Comput. Appl., 2019
J. Medical Syst., 2019
A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification.
J. Intell. Fuzzy Syst., 2019
Inf. Technol. Control., 2019
An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol.
Inf. Technol. Control., 2019
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications.
ISC Int. J. Inf. Secur., 2019
Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications.
IEEE Internet Things J., 2019
An enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure.
Int. J. Commun. Syst., 2019
GUIDE: Smartphone sensors-based pedestrian indoor localization with heterogeneous devices.
Int. J. Commun. Syst., 2019
Analysis and improvement of a secure key management protocol for e-health applications.
Comput. Electr. Eng., 2019
Design of a Secure Password-Based Authentication Scheme for M2M Networks in IoT Enabled Cyber-Physical Systems.
IEEE Access, 2019
Questioning Key Compromise Attack on Ostad-Sharif et al.'s Authentication and Session key Generation Scheme for Healthcare Applications.
IEEE Access, 2019
2018
EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks.
Veh. Commun., 2018
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers.
J. Supercomput., 2018
J. Supercomput., 2018
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018
Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors.
Telecommun. Syst., 2018
Sustain. Comput. Informatics Syst., 2018
An improved and provably secure three-factor user authentication scheme for wireless sensor networks.
Peer-to-Peer Netw. Appl., 2018
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multim. Tools Appl., 2018
An improved and secure chaotic map based authenticated key agreement in multi-server architecture.
Multim. Tools Appl., 2018
A secure mutual authenticated key agreement of user with multiple servers for critical systems.
Multim. Tools Appl., 2018
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments.
J. Netw. Comput. Appl., 2018
A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications.
J. Ambient Intell. Humaniz. Comput., 2018
Provably secure biometric based authentication and key agreement protocol for wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., 2018
Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography.
J. Ambient Intell. Humaniz. Comput., 2018
KSII Trans. Internet Inf. Syst., 2018
Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks.
Inf. Technol. Control., 2018
Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things.
IEEE Internet Things J., 2018
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks.
Future Gener. Comput. Syst., 2018
Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure.
Future Gener. Comput. Syst., 2018
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication.
Future Gener. Comput. Syst., 2018
A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city.
Future Gener. Comput. Syst., 2018
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring.
Future Gener. Comput. Syst., 2018
Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps.
Trans. Emerg. Telecommun. Technol., 2018
Expert Syst. Appl., 2018
A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion.
Comput. Electr. Eng., 2018
Comput. Electr. Eng., 2018
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks.
Comput. Electr. Eng., 2018
2017
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017
An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme.
Wirel. Pers. Commun., 2017
An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification.
Wirel. Pers. Commun., 2017
Secur. Commun. Networks, 2017
An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city.
Pers. Ubiquitous Comput., 2017
A new and secure authentication scheme for wireless sensor networks with formal proof.
Peer-to-Peer Netw. Appl., 2017
Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks.
Peer-to-Peer Netw. Appl., 2017
Peer-to-Peer Netw. Appl., 2017
Design flaws of "an anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography".
Multim. Tools Appl., 2017
A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme.
Multim. Tools Appl., 2017
Multim. Tools Appl., 2017
An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks.
Multim. Syst., 2017
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Netw. Comput. Appl., 2017
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments.
J. King Saud Univ. Comput. Inf. Sci., 2017
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security.
J. Ambient Intell. Humaniz. Comput., 2017
Int. J. Imaging Syst. Technol., 2017
An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems.
Int. J. Commun. Syst., 2017
Int. J. Commun. Syst., 2017
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security.
Int. J. Commun. Syst., 2017
Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps.
Int. J. Commun. Syst., 2017
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services.
Future Gener. Comput. Syst., 2017
Design of a provably secure biometrics-based multi-cloud-server authentication scheme.
Future Gener. Comput. Syst., 2017
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment.
Comput. Stand. Interfaces, 2017
On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2017
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks.
Comput. Networks, 2017
A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server.
Comput. Electr. Eng., 2017
An enhanced 1-round authentication protocol for wireless body area networks with user anonymity.
Comput. Electr. Eng., 2017
An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks.
Ann. des Télécommunications, 2017
Security on "Secure Remote Login Scheme with Password and Smart Card Update Facilities".
Proceedings of the Mathematics and Computing - Third International Conference, 2017
2016
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
Wirel. Pers. Commun., 2016
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks.
Secur. Commun. Networks, 2016
Provably secure biometric-based user authentication and key agreement scheme in cloud computing.
Secur. Commun. Networks, 2016
Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS.
Secur. Commun. Networks, 2016
Design of sinkhole node detection mechanism for hierarchical wireless sensor networks.
Secur. Commun. Networks, 2016
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.
Secur. Commun. Networks, 2016
An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks.
Secur. Commun. Networks, 2016
A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks.
Secur. Commun. Networks, 2016
Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks.
Secur. Commun. Networks, 2016
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.
Secur. Commun. Networks, 2016
Provably secure user authentication and key agreement scheme for wireless sensor networks.
Secur. Commun. Networks, 2016
Provably secure three-factor authentication and key agreement scheme for session initiation protocol.
Secur. Commun. Networks, 2016
Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography.
Multim. Tools Appl., 2016
Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.
J. Medical Syst., 2016
An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems.
J. Ambient Intell. Humaniz. Comput., 2016
KSII Trans. Internet Inf. Syst., 2016
Int. J. Commun. Syst., 2016
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps.
Future Gener. Comput. Syst., 2016
Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.
Comput. Methods Programs Biomed., 2016
Secure anonymous mutual authentication for star two-tier wireless body area networks.
Comput. Methods Programs Biomed., 2016
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment.
Ad Hoc Networks, 2016
2015
Wirel. Pers. Commun., 2015
A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design.
Wirel. Pers. Commun., 2015
A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof.
Secur. Commun. Networks, 2015
An enhanced privacy preserving remote user authentication scheme with provable security.
Secur. Commun. Networks, 2015
On the security enhancement of integrated electronic patient records information systems.
Comput. Sci. Inf. Syst., 2015
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks.
Comput. Electr. Eng., 2015
Ad Hoc Networks, 2015
2014
More secure smart card-based remote user password authentication scheme with user anonymity.
Secur. Commun. Networks, 2014
An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement.
Secur. Commun. Networks, 2014
Cryptanalysis and Improvement of "An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems".
Secur. Commun. Networks, 2014
Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce.
J. Medical Syst., 2014
Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014
An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'.
Int. J. Commun. Syst., 2014
More efficient key-hash based fingerprint remote authentication scheme using mobile device.
Computing, 2014
Comput. Electr. Eng., 2014
Cryptanalysis of a robust smart card authentication scheme for multi-server architecture.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the IEEE 12th International Conference on Dependable, 2014
Proceedings of the IEEE Computers, 2014
2013
Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'.
KSII Trans. Internet Inf. Syst., 2013
Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme".
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2013
2012
Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'.
J. Medical Syst., 2012
J. Medical Syst., 2012
Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card.
Central Eur. J. Comput. Sci., 2012
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012
2011
An Improved Efficient Remote Password Authentication Scheme with Smart Card over Insecure Networks.
Int. J. Netw. Secur., 2011
Cryptanalysis of Enhancements of a Password Authentication Scheme over Insecure Networks.
Proceedings of the Contemporary Computing - 4th International Conference, 2011