Shehzad Ashraf Chaudhry

Orcid: 0000-0002-9321-6956

Affiliations:
  • Istanbul Gelisim University, Turkey


According to our database1, Shehzad Ashraf Chaudhry authored at least 127 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Provably Secure Authentication Scheme for Fog Computing-Enabled Intelligent Social Internet of Vehicles.
IEEE Trans. Veh. Technol., September, 2024

PAF-IoD: PUF-Enabled Authentication Framework for the Internet of Drones.
IEEE Trans. Veh. Technol., July, 2024

Scalable computing for large-scale multimedia data analytics.
J. Intell. Inf. Syst., June, 2024

A Security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones.
IEEE Internet Things J., June, 2024

SPAKE-DC: A Secure PUF Enabled Authenticated Key Exchange for 5G-Based Drone Communications.
IEEE Trans. Veh. Technol., April, 2024

A Security-Enhanced and Ultralightweight Communication Protocol for Internet of Medical Things.
IEEE Internet Things J., March, 2024

An effective and efficient UAV leader selection scheme in swarm of UAVs.
Phys. Commun., 2024

Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing.
Comput. Networks, 2024

MCDH-SLKAP: Modified Computational Diffie-Hellman-Based Secure and Lightweight Key Agreement Protocol for Decentralized Edge Computing Networks.
IEEE Access, 2024

2023
An ECC-based mutual data access control protocol for next-generation public cloud.
J. Cloud Comput., December, 2023

Guest Editorial: Special issue on explainable AI empowered for indoor positioning and indoor navigation.
CAAI Trans. Intell. Technol., December, 2023

A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption.
J. Inf. Secur. Appl., November, 2023

CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things.
Internet Things, October, 2023

SUSIC: A Secure User Access Control Mechanism for SDN-Enabled IIoT and Cyber-Physical Systems.
IEEE Internet Things J., September, 2023

CADF-CSE: Chaotic map-based authenticated data access/sharing framework for IoT-enabled cloud storage environment.
Phys. Commun., August, 2023

An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems.
Comput. Commun., May, 2023

Guest Editorial Medical Image Analysis Embedded on Microprocessors.
IEEE J. Biomed. Health Informatics, March, 2023

A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System.
IEEE Trans. Intell. Transp. Syst., February, 2023

AAKE-BIVT: Anonymous Authenticated Key Exchange Scheme for Blockchain-Enabled Internet of Vehicles in Smart Transportation.
IEEE Trans. Intell. Transp. Syst., February, 2023

A Provably Secure Lightweight Key Agreement Protocol for Wireless Body Area Networks in Healthcare System.
IEEE Trans. Ind. Informatics, 2023

LAS-SG: An Elliptic Curve-Based Lightweight Authentication Scheme for Smart Grid Environments.
IEEE Trans. Ind. Informatics, 2023

Cross-Corpus Multilingual Speech Emotion Recognition: Amharic vs. Other Languages.
CoRR, 2023

Securing High-Resolution Images From Unmanned Aerial Vehicles With DNA Encoding and Bit-Plane Extraction Method.
IEEE Access, 2023

BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment.
IEEE Access, 2023

An Efficient and Reliable User Access Protocol for Internet of Drones.
IEEE Access, 2023

Reliable and Resilient Communication in Duty Cycled Software Defined Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Communications, 2023

2022
A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance.
IEEE Trans. Intell. Transp. Syst., 2022

An Efficient and Provably Secure Certificateless Protocol for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

A Privacy Enhanced Authentication Scheme for Securing Smart Grid Infrastructure.
IEEE Trans. Ind. Informatics, 2022

PFLUA-DIoT: A Pairing Free Lightweight and Unlinkable User Access Control Scheme for Distributed IoT Environments.
IEEE Syst. J., 2022

Security, Trust and Privacy for Cloud, Fog and Internet of Things.
Secur. Commun. Networks, 2022

ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment.
J. Ambient Intell. Humaniz. Comput., 2022

A Robust Access Control Protocol for the Smart Grid Systems.
IEEE Internet Things J., 2022

A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles.
Int. J. Distributed Sens. Networks, 2022

An enhanced scheme for mutual authentication for healthcare services.
Digit. Commun. Networks, 2022

Designing secure and lightweight user access to drone for smart city surveillance.
Comput. Stand. Interfaces, 2022

A seamless anonymous authentication protocol for mobile edge computing infrastructure.
Comput. Commun., 2022

An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing.
Comput. Networks, 2022

Guest Editorial: Introduction to the special section on security and privacy in the big data era (VSI-spbd).
Comput. Electr. Eng., 2022

A low-cost privacy preserving user access in mobile edge computing framework.
Comput. Electr. Eng., 2022

REAS-TMIS: Resource-Efficient Authentication Scheme for Telecare Medical Information System.
IEEE Access, 2022

Designing an Enhanced User Authenticated Key Management Scheme for 6G-Based Industrial Applications.
IEEE Access, 2022

2021
Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server.
IEEE Trans. Reliab., 2021

Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment.
ACM Trans. Internet Techn., 2021

A Novel Pairing-Free Lightweight Authentication Protocol for Mobile Cloud Computing Framework.
IEEE Syst. J., 2021

Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones.
IEEE Syst. J., 2021

DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre.
Secur. Commun. Networks, 2021

Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles.
Secur. Commun. Networks, 2021

A secure and improved multi server authentication protocol using fuzzy commitment.
Multim. Tools Appl., 2021

Comment on 'ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications'.
IET Networks, 2021

A Physical Capture Resistant Authentication Scheme for the Internet of Drones.
IEEE Commun. Stand. Mag., 2021

A secure and lightweight authentication scheme for next generation IoT infrastructure.
Comput. Commun., 2021

A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment.
Comput. Networks, 2021

GCACS-IoD: A certificate based generic access control scheme for Internet of drones.
Comput. Networks, 2021

A clogging resistant secure authentication scheme for fog computing services.
Comput. Networks, 2021

PASKE-IoD: Privacy-Protecting Authenticated Key Establishment for Internet of Drones.
IEEE Access, 2021

ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids.
IEEE Access, 2021

A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System.
Proceedings of the International Conference on Communications, 2021

2020
An Improved SIP Authenticated Key Agreement Based on Dongqing et al.
Wirel. Pers. Commun., 2020

A Privacy Preserving Authentication Scheme for Roaming in IoT-Based Wireless Mobile Networks.
Symmetry, 2020

Machine Learning Algorithms for Smart Data Analysis in Internet of Things Environment: Taxonomies and Research Trends.
Symmetry, 2020

Sixth Generation (6G) Wireless Networks: Vision, Research Activities, Challenges and Potential Solutions.
Symmetry, 2020

A robust authentication and access control protocol for securing wireless healthcare sensor networks.
J. Inf. Secur. Appl., 2020

A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things.
Int. J. Commun. Syst., 2020

Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems.
Comput. Commun., 2020

A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems.
IEEE Access, 2020

Securing Demand Response Management: A Certificate-Based Access Control in Smart Grid Edge Computing Infrastructure.
IEEE Access, 2020

ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments.
IEEE Access, 2020

Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles.
IEEE Access, 2020

2019
An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre.
IEEE Syst. J., 2019

Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography.
Sensors, 2019

Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment.
Mob. Networks Appl., 2019

An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol.
Inf. Technol. Control., 2019

Comments on "Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment".
IEEE Internet Things J., 2019

An enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure.
Int. J. Commun. Syst., 2019

Performance analysis of secure communications over correlated slow-fading additive white Gaussian noise channels.
Int. J. Commun. Syst., 2019

A provable and secure mobile user authentication scheme for mobile cloud computing services.
Int. J. Commun. Syst., 2019

Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key.
Int. J. Commun. Syst., 2019

An improved anonymous authentication scheme for distributed mobile cloud computing services.
Clust. Comput., 2019

2018
An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data.
J. Supercomput., 2018

An efficient and secure design of multi-server authenticated key agreement protocol.
J. Supercomput., 2018

An improved and robust biometrics-based three factor authentication scheme for multiserver environments.
J. Supercomput., 2018

An improved and secure chaotic map based authenticated key agreement in multi-server architecture.
Multim. Tools Appl., 2018

A secure mutual authenticated key agreement of user with multiple servers for critical systems.
Multim. Tools Appl., 2018

An enhanced lightweight anonymous biometric based authentication scheme for TMIS.
Multim. Tools Appl., 2018

Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
KSII Trans. Internet Inf. Syst., 2018

Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee's Scheme.
Inf. Technol. Control., 2018

An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment.
Int. J. Commun. Syst., 2018

Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure.
Future Gener. Comput. Syst., 2018

An elliptic curve cryptography based lightweight authentication scheme for smart grid communication.
Future Gener. Comput. Syst., 2018

2017
An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification.
Wirel. Pers. Commun., 2017

An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2017

A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks.
Wirel. Pers. Commun., 2017

Comments on "A privacy preserving three-factor authentication protocol for e-health clouds".
J. Supercomput., 2017

An improved smart card based authentication scheme for session initiation protocol.
Peer-to-Peer Netw. Appl., 2017

An improved and provably secure privacy preserving authentication protocol for SIP.
Peer-to-Peer Netw. Appl., 2017

A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme.
Multim. Tools Appl., 2017

An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems.
Multim. Tools Appl., 2017

Security Vulnerabilities and Improvements of SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks.
Inf. Technol. Control., 2017

A robust ElGamal-based password-authentication protocol using smart card for client-server communication.
Int. J. Commun. Syst., 2017

An improved lightweight multiserver authentication scheme.
Int. J. Commun. Syst., 2017

A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security.
Int. J. Commun. Syst., 2017

A privacy preserving authentication scheme for roaming in ubiquitous networks.
Clust. Comput., 2017

Efficient end-to-end authentication protocol for wearable health monitoring systems.
Comput. Electr. Eng., 2017

Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management".
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

2016
An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client-Client Networks.
Wirel. Pers. Commun., 2016

An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre.
J. Supercomput., 2016

A provably secure anonymous authentication scheme for Session Initiation Protocol.
Secur. Commun. Networks, 2016

A secure biometric based multi-server authentication scheme for social multimedia networks.
Multim. Tools Appl., 2016

A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.
J. Medical Syst., 2016

A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Syst., 2016

An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services.
KSII Trans. Internet Inf. Syst., 2016

An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture.
KSII Trans. Internet Inf. Syst., 2016

A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography.
Electron. Commer. Res., 2016

A lightweight message authentication scheme for Smart Grid communications in power sector.
Comput. Electr. Eng., 2016

2015
An enhanced privacy preserving remote user authentication scheme with provable security.
Secur. Commun. Networks, 2015

A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2015

An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography.
Multim. Tools Appl., 2015

Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems.
J. Medical Syst., 2015

An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.
J. Medical Syst., 2015

An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks.
Inf. Technol. Control., 2015

Comment on 'Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications'.
IET Commun., 2015

A Secure Authentication Scheme for Session Initiation Protocol Based on Elliptic Curve Cryptography.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme.
Secur. Commun. Networks, 2014

2012
An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem.
Proceedings of 9th IEEE International Conference on Networking, Sensing and Control, 2012

Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem.
Proceedings of the Information Systems, Technology and Management, 2012

2010
Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010


  Loading...