Saru Kumari

Orcid: 0000-0003-4929-5383

According to our database1, Saru Kumari authored at least 297 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Provably Secure Anti-Phishing Scheme for Medical Information in Smart Healthcare.
IEEE Internet Things J., December, 2024

Blockchain and Machine Learning Integrated Secure Driver Behavior Centric Electric Vehicle Insurance Model.
IEEE Trans. Intell. Transp. Syst., November, 2024

Lightweight Verifiable Privacy-Preserving Data Aggregation for Smart Grids.
IEEE Internet Things J., October, 2024

Designing Anonymous Key Agreement Scheme for Secure Vehicular Ad-Hoc Networks.
IEEE Trans. Intell. Transp. Syst., September, 2024

Traceable Attribute-Based Encryption With Equality Test for Cloud Enabled E-Health System.
IEEE J. Biomed. Health Informatics, September, 2024

Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment.
IEEE Internet Things J., July, 2024

An AR-Based Meta Vehicle Road Cooperation Testing Systems: Framework, Components Modeling, and an Implementation Example.
IEEE Internet Things J., July, 2024

Transferability of Adversarial Attacks on Tiny Deep Learning Models for IoT Unmanned Aerial Vehicles.
IEEE Internet Things J., June, 2024

Efficient plaintext checkable identity-based signcryption in cyber-physical systems towards IIoT.
Trans. Emerg. Telecommun. Technol., June, 2024

On the Security of a Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks.
Wirel. Pers. Commun., May, 2024

A Privacy-Preserving Authentication Protocol for Electric Vehicle Battery Swapping Based on Intelligent Blockchain.
IEEE Internet Things J., May, 2024

A survey on the blockchain techniques for the Internet of Vehicles security.
Trans. Emerg. Telecommun. Technol., April, 2024

A module lattice based construction of post quantum secure blockchain architecture.
Trans. Emerg. Telecommun. Technol., April, 2024

Privacy preserving support vector machine based on federated learning for distributed IoT-enabled data analysis.
Comput. Intell., April, 2024

Sustainable Secure Communication in Consumer-Centric Electric Vehicle Charging in Industry 5.0 Environments.
IEEE Trans. Consumer Electron., February, 2024

A Post-Quantum Compliant Authentication Scheme for IoT Healthcare Systems.
IEEE Internet Things J., February, 2024

Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures.
J. Supercomput., January, 2024

Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures.
J. Supercomput., January, 2024

An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring.
J. Ambient Intell. Humaniz. Comput., January, 2024

Practical Feature Inference Attack in Vertical Federated Learning During Prediction in Artificial Internet of Things.
IEEE Internet Things J., January, 2024

Finger pinching and imagination classification: A fusion of CNN architectures for IoMT-enabled BCI applications.
Inf. Fusion, January, 2024

ERLNEIL-MDP: Evolutionary reinforcement learning with novelty-driven exploration for medical data processing.
Swarm Evol. Comput., 2024

Flaw and amendment of Dharminder et al.'s authentication protocol for satellite communication.
Secur. Priv., 2024

A trustworthy data collection approach from sensor nodes using trust score of mobile vehicles for smart city.
Secur. Priv., 2024

On the security of a novel privacy-preserving authentication scheme for V2G networks.
Secur. Priv., 2024

Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system.
J. Syst. Archit., 2024

Industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training.
J. Ind. Inf. Integr., 2024

SL3PAKE: Simple Lattice-based Three-party Password Authenticated Key Exchange for post-quantum world.
J. Inf. Secur. Appl., 2024

A lightweight BRLWE-based post-quantum cryptosystem with side-channel resilience for IoT security.
Internet Things, 2024

Cross-modal interaction and multi-source visual fusion for video generation in fetal cardiac screening.
Inf. Fusion, 2024

Digital twin-assisted service function chaining in multi-domain computing power networks with multi-agent reinforcement learning.
Future Gener. Comput. Syst., 2024

Proxy re-encryption with plaintext checkable encryption for integrating digital twins into IIoT.
Comput. Electr. Eng., 2024

Secure personal-health-records searching in edge-based Internet of Medical Things through plaintext checkable encryption.
Comput. Electr. Eng., 2024

Pairing-free certificateless public key encryption with equality test for Internet of Vehicles.
Comput. Electr. Eng., 2024

Decoding the third dimension in the metaverse: A comprehensive method for reconstructing 2D NFT portraits into 3D models.
Appl. Soft Comput., 2024

Towards classification and comprehensive analysis of AI-based COVID-19 diagnostic techniques: A survey.
Artif. Intell. Medicine, 2024

2023
PRS-HDMC: An online participant recruitment scheme for vehicular crowdsensing-enabled HD map collection.
Internet Things, December, 2023

Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture.
EURASIP J. Wirel. Commun. Netw., December, 2023

Privacy-Aware Multiagent Deep Reinforcement Learning for Task Offloading in VANET.
IEEE Trans. Intell. Transp. Syst., November, 2023

Safety and security of autonomous vehicles.
Trans. Emerg. Telecommun. Technol., November, 2023

χperbp: a cloud-based lightweight mutual authentication protocol.
Peer Peer Netw. Appl., August, 2023

An efficient certificateless key exchange protocol for heterogeneous networks in human-centered IoT systems.
Int. J. Commun. Syst., August, 2023

Blockchain-based privacy-preserving authentication protocol for UAV networks.
Comput. Networks, April, 2023

Fog-based low latency and lightweight authentication protocol for vehicular communication.
Peer Peer Netw. Appl., March, 2023

Enhanced privacy-preserving in student certificate management in blockchain and interplanetary file system.
Multim. Tools Appl., March, 2023

A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment.
Veh. Commun., February, 2023

DisBezant: Secure and Robust Federated Learning Against Byzantine Attack in IoT-Enabled MTS.
IEEE Trans. Intell. Transp. Syst., February, 2023

Deep Semantics Sorting of Voice-Interaction-Enabled Industrial Control System.
IEEE Internet Things J., February, 2023

A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication.
Trans. Emerg. Telecommun. Technol., January, 2023

A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment.
IEEE Trans. Netw. Sci. Eng., 2023

Blockchain architecture and methodologies for internet of things environment.
Secur. Priv., 2023

An energy and time-saving task scheduling algorithm for UAV-IoT collaborative system.
Microprocess. Microsystems, 2023

VQR: vulnerability analysis in quadratic residues-based authentication protocols.
J. Ambient Intell. Humaniz. Comput., 2023

Systematic survey of mobile payments, protocols, and security infrastructure.
J. Ambient Intell. Humaniz. Comput., 2023

A secure protocol for patient monitoring in wireless body area networks.
Concurr. Comput. Pract. Exp., 2023

2022
Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing.
ACM Trans. Internet Techn., 2022

A provably secure lightweight authentication protocol in mobile edge computing environments.
J. Supercomput., 2022

A lightweight authentication and key agreement protocol for heterogeneous IoT with special attention to sensing devices and gateway.
J. Supercomput., 2022

AFFIRM: Provably Forward Privacy for Searchable Encryption in Cooperative Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2022

Personalized Privacy-Aware Task Offloading for Edge-Cloud-Assisted Industrial Internet of Things in Automated Manufacturing.
IEEE Trans. Ind. Informatics, 2022

Forward Privacy Preservation in IoT-Enabled Healthcare Systems.
IEEE Trans. Ind. Informatics, 2022

SAKE*: A Symmetric Authenticated Key Exchange Protocol With Perfect Forward Secrecy for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

RAKS: robust authentication and key agreement scheme for satellite infrastructure.
Telecommun. Syst., 2022

Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices.
IEEE Trans. Dependable Secur. Comput., 2022

SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing.
Symmetry, 2022

Efficient Unbounded Fully Attribute Hiding Inner Product Encryption in Cloud-Aided WBANs.
IEEE Syst. J., 2022

Defending Industry 4.0: An Enhanced Authentication Scheme for IoT Devices.
IEEE Syst. J., 2022

Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments.
Sensors, 2022

Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm.
Sensors, 2022

An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT.
Sensors, 2022

LAP-IoHT: A Lightweight Authentication Protocol for the Internet of Health Things.
Sensors, 2022

An authentication and key agreement scheme for smart grid.
Peer-to-Peer Netw. Appl., 2022

Predicting airline customers' recommendations using qualitative and quantitative contents of online reviews.
Multim. Tools Appl., 2022

Data Augmentation for Internet of Things Dialog System.
Mob. Networks Appl., 2022

A survey on Attribute-Based Signatures.
J. Syst. Archit., 2022

Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message.
IEEE Internet Things J., 2022

An Authentication Protocol for Next Generation of Constrained IoT Systems.
IEEE Internet Things J., 2022

Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems.
IEEE Internet Things J., 2022

Cryptanalysis and improvement of an authentication scheme for IoT.
Int. J. Inf. Comput. Secur., 2022

Green energy-efficient computing solutions in Internet of Things communications.
Int. J. Commun. Syst., 2022

Smart sensors in vehicular communication networks: Principles, algorithms, systems and applications.
Int. J. Commun. Syst., 2022

Energy-efficient fog computing in Internet of Things based on Routing Protocol for Low-Power and Lossy Network with Contiki.
Int. J. Commun. Syst., 2022

Proxy re-encryption with equality test for secure data sharing in Internet of Things-based healthcare systems.
Trans. Emerg. Telecommun. Technol., 2022

An enhanced scheme for mutual authentication for healthcare services.
Digit. Commun. Networks, 2022

Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment.
IEEE Consumer Electron. Mag., 2022

Guest editorial: Introduction to the special section on sustainable security solutions for Internet of Vehicles (VSI-iov).
Comput. Electr. Eng., 2022

Slight: A lightweight authentication scheme for smart healthcare services.
Comput. Electr. Eng., 2022

A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios.
Proceedings of the Information Security Practice and Experience, 2022

2021
On the Security of "Secure and Lightweight Authentication with Key Agreement for Smart Wearable Systems".
Wirel. Pers. Commun., 2021

Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services.
Wirel. Pers. Commun., 2021

A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2021

Intelligent monitor for typhoon in IoT system of smart city.
J. Supercomput., 2021

HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs.
IEEE Trans. Intell. Transp. Syst., 2021

Voice-Transfer Attacking on Industrial Voice Control Systems in 5G-Aided IIoT Domain.
IEEE Trans. Ind. Informatics, 2021

Reconciliation based key exchange schemes using lattices: a review.
Telecommun. Syst., 2021

A Novel Multiserver Authentication Scheme Using Proxy Resignature With Scalability and Strong User Anonymity.
IEEE Syst. J., 2021

Comments on "Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC".
IEEE Syst. J., 2021

Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV.
IEEE Syst. J., 2021

Comment on "Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication".
IEEE Syst. J., 2021

LBA-PAKE: Lattice-Based Anonymous Password Authenticated Key Exchange for Mobile Devices.
IEEE Syst. J., 2021

Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System.
Secur. Commun. Networks, 2021

Verifiable dynamic ranked search with forward privacy over encrypted cloud data.
Peer-to-Peer Netw. Appl., 2021

Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009-2020).
J. Netw. Comput. Appl., 2021

An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System.
J. Medical Syst., 2021

A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT).
J. Inf. Secur. Appl., 2021

Flaw and amendment of a two-party authenticated key agreement protocol for post-quantum environments.
J. Inf. Secur. Appl., 2021

Heterogeneous Signcryption With Equality Test for IIoT Environment.
IEEE Internet Things J., 2021

Neural Architecture Search for Robust Networks in 6G-Enabled Massive IoT Domain.
IEEE Internet Things J., 2021

Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen Key Attacks for Industrial Internet of Things.
IEEE Internet Things J., 2021

Certain investigations on recent advances in the design of decoding algorithms using low-density parity-check codes and its applications.
Int. J. Commun. Syst., 2021

SEBAP: A secure and efficient biometric-assisted authentication protocol using ECC for vehicular cloud computing.
Int. J. Commun. Syst., 2021

Smart workload migration on external cloud service providers to minimize delay, running time, and transfer cost.
Int. J. Commun. Syst., 2021

\(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol.
IACR Cryptol. ePrint Arch., 2021

Privacy-aware resource management solutions in Internet of Things.
Trans. Emerg. Telecommun. Technol., 2021

Post quantum secure conditional privacy preserving authentication for edge based vehicular communication.
Trans. Emerg. Telecommun. Technol., 2021

A novel authentication and key-agreement scheme for satellite communication network.
Trans. Emerg. Telecommun. Technol., 2021

A secure authenticated and key exchange scheme for fog computing.
Enterp. Inf. Syst., 2021

Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology.
Digit. Commun. Networks, 2021

A Technical Report for Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment.
CoRR, 2021

Transfer reinforcement learning-based road object detection in next generation IoT domain.
Comput. Networks, 2021

Sentiment analysis of tweets using a unified convolutional neural network-long short-term memory network model.
Comput. Intell., 2021

Supervised learning model for identifying illegal activities in Bitcoin.
Appl. Intell., 2021

The Internet of vehicles and smart cities.
Ann. des Télécommunications, 2021

Questioning the Security of Three Recent Authentication and Key Agreement Protocols.
IEEE Access, 2021

AMAPG: Advanced Mobile Authentication Protocol for GLOMONET.
IEEE Access, 2021

Practical Identity Based Online/Off-Line Signcryption Scheme for Secure Communication in Internet of Things.
IEEE Access, 2021

ECC-Based Three-Factor Authentication Scheme For Multi-Server Environment.
Proceedings of the International Semantic Intelligence Conference 2021 (ISIC 2021), 2021

2020
Comments on "A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things".
Wirel. Pers. Commun., 2020

RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing.
Veh. Commun., 2020

An approach for solving fully fuzzy multi-objective linear fractional optimization problems.
Soft Comput., 2020

An Improved Blockchain-Based Authentication Protocol for IoT Network Management.
Secur. Commun. Networks, 2020

Decentralized Private Information Sharing Protocol on Social Networks.
Secur. Commun. Networks, 2020

A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments.
Peer-to-Peer Netw. Appl., 2020

An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure.
J. Sensors, 2020

A secure blockchain-based e-health records storage and sharing scheme.
J. Inf. Secur. Appl., 2020

A provably secure ECC-based roaming authentication scheme for global mobility networks.
J. Inf. Secur. Appl., 2020

Fuzzy extraction and PUF based three party authentication protocol using USB as mass storage device.
J. Inf. Secur. Appl., 2020

Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT.
IEEE Internet Things J., 2020

Comments on "AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment".
IEEE Internet Things J., 2020

Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0".
IEEE Internet Things J., 2020

Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity.
Int. J. Inf. Sec., 2020

A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things.
Int. J. Commun. Syst., 2020

Revised anonymous authentication protocol for adaptive client-server infrastructure.
Int. J. Commun. Syst., 2020

A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs.
Int. J. Commun. Syst., 2020

Gateway-oriented two-server password authenticated key exchange protocol for unmanned aerial vehicles in mobile edge computing.
IET Commun., 2020

An anonymous authenticated key-agreement scheme for multi-server infrastructure.
Hum. centric Comput. Inf. Sci., 2020

PoRX: A reputation incentive scheme for blockchain consensus of IIoT.
Future Gener. Comput. Syst., 2020

An enhanced authentication protocol for client server environment.
Frontiers Comput. Sci., 2020

An efficient certificateless aggregate signature scheme for the Internet of Vehicles.
Trans. Emerg. Telecommun. Technol., 2020

Proof of X-repute blockchain consensus protocol for IoT systems.
Comput. Secur., 2020

A secure and scalable data integrity auditing scheme based on hyperledger fabric.
Comput. Secur., 2020

A privacy-preserving scheme with identity traceable property for smart grid.
Comput. Commun., 2020

Joint-learning segmentation in Internet of drones (IoD)-based monitor systems.
Comput. Commun., 2020

Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain.
Comput. Electr. Eng., 2020

An anonymous and identity-trackable data transmission scheme for smart grid under smart city notion.
Ann. des Télécommunications, 2020

An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks.
IEEE Access, 2020

A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments.
IEEE Access, 2020

RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications.
IEEE Access, 2020

CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC.
IEEE Access, 2020

A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid.
IEEE Access, 2020

An Enhanced Authentication Protocol for RFID Systems.
IEEE Access, 2020

Lightweight Authentication Protocol for NFC Based Anti-Counterfeiting System in IoT Infrastructure.
IEEE Access, 2020

A Lightweight Key Agreement and Authentication Scheme for Satellite-Communication Systems.
IEEE Access, 2020

Anonymous Key-Agreement Protocol for V2G Environment Within Social Internet of Vehicles.
IEEE Access, 2020

2019
Secure CLS and CL-AS schemes designed for VANETs.
J. Supercomput., 2019

Optimality criteria for fuzzy-valued fractional multi-objective optimization problem.
Soft Comput., 2019

Duality-based branch-bound computational algorithm for sum-of-linear-fractional multi-objective optimization problem.
Soft Comput., 2019

A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography.
IEEE Syst. J., 2019

An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre.
IEEE Syst. J., 2019

Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks.
Sensors, 2019

Multimodal data modeling for efficiency assessment of social priority based urban bus route transportation system using GIS and data envelopment analysis.
Multim. Tools Appl., 2019

Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment.
Mob. Networks Appl., 2019

A provably secure and anonymous message authentication scheme for smart grids.
J. Parallel Distributed Comput., 2019

AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities.
J. Netw. Comput. Appl., 2019

Design of a Secure Three-Factor Authentication Scheme for Smart Healthcare.
J. Medical Syst., 2019

A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification.
J. Intell. Fuzzy Syst., 2019

An Authentication Framework for Roaming Service in Global Mobility Networks.
Inf. Technol. Control., 2019

An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol.
Inf. Technol. Control., 2019

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications.
ISC Int. J. Inf. Secur., 2019

Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications.
IEEE Internet Things J., 2019

An enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure.
Int. J. Commun. Syst., 2019

GUIDE: Smartphone sensors-based pedestrian indoor localization with heterogeneous devices.
Int. J. Commun. Syst., 2019

Analysis and improvement of a secure key management protocol for e-health applications.
Comput. Electr. Eng., 2019

SPSR-FSPG: A Fast Simulative Password Set Generation Algorithm.
IEEE Access, 2019

Design of a Secure Password-Based Authentication Scheme for M2M Networks in IoT Enabled Cyber-Physical Systems.
IEEE Access, 2019

Questioning Key Compromise Attack on Ostad-Sharif et al.'s Authentication and Session key Generation Scheme for Healthcare Applications.
IEEE Access, 2019

2018
EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks.
Veh. Commun., 2018

A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers.
J. Supercomput., 2018

An efficient and secure design of multi-server authenticated key agreement protocol.
J. Supercomput., 2018

Attribute-based authentication on the cloud for thin clients.
J. Supercomput., 2018

A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors.
Telecommun. Syst., 2018

A certificateless aggregate signature scheme for healthcare wireless sensor network.
Sustain. Comput. Informatics Syst., 2018

An improved and provably secure three-factor user authentication scheme for wireless sensor networks.
Peer-to-Peer Netw. Appl., 2018

A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multim. Tools Appl., 2018

An improved and secure chaotic map based authenticated key agreement in multi-server architecture.
Multim. Tools Appl., 2018

A secure mutual authenticated key agreement of user with multiple servers for critical systems.
Multim. Tools Appl., 2018

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments.
J. Netw. Comput. Appl., 2018

A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications.
J. Ambient Intell. Humaniz. Comput., 2018

Provably secure biometric based authentication and key agreement protocol for wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., 2018

Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography.
J. Ambient Intell. Humaniz. Comput., 2018

Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
KSII Trans. Internet Inf. Syst., 2018

Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks.
Inf. Technol. Control., 2018

Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things.
IEEE Internet Things J., 2018

A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks.
Future Gener. Comput. Syst., 2018

Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure.
Future Gener. Comput. Syst., 2018

An elliptic curve cryptography based lightweight authentication scheme for smart grid communication.
Future Gener. Comput. Syst., 2018

A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city.
Future Gener. Comput. Syst., 2018

A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring.
Future Gener. Comput. Syst., 2018

Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps.
Trans. Emerg. Telecommun. Technol., 2018

Design and implementation of a multibiometric system based on hand's traits.
Expert Syst. Appl., 2018

A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion.
Comput. Electr. Eng., 2018

Introduction to the special section on Big data and IoT in e-healthcare.
Comput. Electr. Eng., 2018

An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks.
Comput. Electr. Eng., 2018

2017
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017

Secure Data Access and Sharing Scheme for Cloud Storage.
Wirel. Pers. Commun., 2017

A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017

An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme.
Wirel. Pers. Commun., 2017

An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification.
Wirel. Pers. Commun., 2017

A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments.
Secur. Commun. Networks, 2017

An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city.
Pers. Ubiquitous Comput., 2017

A new and secure authentication scheme for wireless sensor networks with formal proof.
Peer-to-Peer Netw. Appl., 2017

Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks.
Peer-to-Peer Netw. Appl., 2017

An improved smart card based authentication scheme for session initiation protocol.
Peer-to-Peer Netw. Appl., 2017

Design flaws of "an anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography".
Multim. Tools Appl., 2017

A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme.
Multim. Tools Appl., 2017

A password based authentication scheme for wireless multimedia systems.
Multim. Tools Appl., 2017

An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks.
Multim. Syst., 2017

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Netw. Comput. Appl., 2017

An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments.
J. King Saud Univ. Comput. Inf. Sci., 2017

A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security.
J. Ambient Intell. Humaniz. Comput., 2017

An Efficient DWT and Intuitionistic Fuzzy Based Multimodality Medical Image Fusion.
Int. J. Imaging Syst. Technol., 2017

An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems.
Int. J. Commun. Syst., 2017

An improved lightweight multiserver authentication scheme.
Int. J. Commun. Syst., 2017

A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security.
Int. J. Commun. Syst., 2017

Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps.
Int. J. Commun. Syst., 2017

Provably secure authenticated key agreement scheme for distributed mobile cloud computing services.
Future Gener. Comput. Syst., 2017

Design of a provably secure biometrics-based multi-cloud-server authentication scheme.
Future Gener. Comput. Syst., 2017

Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment.
Comput. Stand. Interfaces, 2017

On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2017

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks.
Comput. Networks, 2017

A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server.
Comput. Electr. Eng., 2017

An enhanced 1-round authentication protocol for wireless body area networks with user anonymity.
Comput. Electr. Eng., 2017

An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks.
Ann. des Télécommunications, 2017

Security on "Secure Remote Login Scheme with Password and Smart Card Update Facilities".
Proceedings of the Mathematics and Computing - Third International Conference, 2017

2016
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
Wirel. Pers. Commun., 2016

A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks.
Secur. Commun. Networks, 2016

Provably secure biometric-based user authentication and key agreement scheme in cloud computing.
Secur. Commun. Networks, 2016

Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS.
Secur. Commun. Networks, 2016

Design of sinkhole node detection mechanism for hierarchical wireless sensor networks.
Secur. Commun. Networks, 2016

A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.
Secur. Commun. Networks, 2016

An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks.
Secur. Commun. Networks, 2016

A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks.
Secur. Commun. Networks, 2016

Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks.
Secur. Commun. Networks, 2016

An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.
Secur. Commun. Networks, 2016

Provably secure user authentication and key agreement scheme for wireless sensor networks.
Secur. Commun. Networks, 2016

Provably secure three-factor authentication and key agreement scheme for session initiation protocol.
Secur. Commun. Networks, 2016

Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2016

A more secure digital rights management authentication scheme based on smart card.
Multim. Tools Appl., 2016

Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography.
Multim. Tools Appl., 2016

Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.
J. Medical Syst., 2016

An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems.
J. Ambient Intell. Humaniz. Comput., 2016

A User Anonymous Mutual Authentication Protocol.
KSII Trans. Internet Inf. Syst., 2016

Design of a user anonymous password authentication scheme without smart card.
Int. J. Commun. Syst., 2016

A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps.
Future Gener. Comput. Syst., 2016

Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.
Comput. Methods Programs Biomed., 2016

Secure anonymous mutual authentication for star two-tier wireless body area networks.
Comput. Methods Programs Biomed., 2016

An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment.
Ad Hoc Networks, 2016

2015
An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture.
Wirel. Pers. Commun., 2015

A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design.
Wirel. Pers. Commun., 2015

A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof.
Secur. Commun. Networks, 2015

An enhanced privacy preserving remote user authentication scheme with provable security.
Secur. Commun. Networks, 2015

On the security enhancement of integrated electronic patient records information systems.
Comput. Sci. Inf. Syst., 2015

A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks.
Comput. Electr. Eng., 2015

User authentication schemes for wireless sensor networks: A review.
Ad Hoc Networks, 2015

2014
More secure smart card-based remote user password authentication scheme with user anonymity.
Secur. Commun. Networks, 2014

An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement.
Secur. Commun. Networks, 2014

Cryptanalysis and Improvement of "An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems".
Secur. Commun. Networks, 2014

Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce.
J. Medical Syst., 2014

Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014

An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'.
Int. J. Commun. Syst., 2014

More efficient key-hash based fingerprint remote authentication scheme using mobile device.
Computing, 2014

An improved remote user authentication scheme with key agreement.
Comput. Electr. Eng., 2014

Cryptanalysis of a robust smart card authentication scheme for multi-server architecture.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Notes on "a password-based remote user authentication scheme without smart card".
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Security Issues of Chen et al.'s Dynamic ID-Based Authentication Scheme.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

A secure remote user mutual authentication scheme using smart cards.
Proceedings of the IEEE Computers, 2014

2013
Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'.
KSII Trans. Internet Inf. Syst., 2013

Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme".
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2013

2012
Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'.
J. Medical Syst., 2012

An Authentication Scheme for Secure Access to Healthcare Services.
J. Medical Syst., 2012

Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card.
Central Eur. J. Comput. Sci., 2012

Further cryptanalysis of 'A remote authentication scheme using mobile device'.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
An Improved Efficient Remote Password Authentication Scheme with Smart Card over Insecure Networks.
Int. J. Netw. Secur., 2011

Cryptanalysis of Enhancements of a Password Authentication Scheme over Insecure Networks.
Proceedings of the Contemporary Computing - 4th International Conference, 2011


  Loading...