Shehzad Ashraf Chaudhry
Orcid: 0000-0002-9321-6956Affiliations:
- Istanbul Gelisim University, Turkey
According to our database1,
Shehzad Ashraf Chaudhry
authored at least 128 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Provably Secure Authentication Scheme for Fog Computing-Enabled Intelligent Social Internet of Vehicles.
IEEE Trans. Veh. Technol., September, 2024
IEEE Trans. Veh. Technol., July, 2024
J. Intell. Inf. Syst., June, 2024
A Security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones.
IEEE Internet Things J., June, 2024
SPAKE-DC: A Secure PUF Enabled Authenticated Key Exchange for 5G-Based Drone Communications.
IEEE Trans. Veh. Technol., April, 2024
A Security-Enhanced and Ultralightweight Communication Protocol for Internet of Medical Things.
IEEE Internet Things J., March, 2024
Phys. Commun., 2024
Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing.
Comput. Networks, 2024
IEEE Access, 2024
MCDH-SLKAP: Modified Computational Diffie-Hellman-Based Secure and Lightweight Key Agreement Protocol for Decentralized Edge Computing Networks.
IEEE Access, 2024
2023
J. Cloud Comput., December, 2023
Guest Editorial: Special issue on explainable AI empowered for indoor positioning and indoor navigation.
CAAI Trans. Intell. Technol., December, 2023
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption.
J. Inf. Secur. Appl., November, 2023
CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things.
Internet Things, October, 2023
SUSIC: A Secure User Access Control Mechanism for SDN-Enabled IIoT and Cyber-Physical Systems.
IEEE Internet Things J., September, 2023
CADF-CSE: Chaotic map-based authenticated data access/sharing framework for IoT-enabled cloud storage environment.
Phys. Commun., August, 2023
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems.
Comput. Commun., May, 2023
IEEE J. Biomed. Health Informatics, March, 2023
IEEE Trans. Intell. Transp. Syst., February, 2023
AAKE-BIVT: Anonymous Authenticated Key Exchange Scheme for Blockchain-Enabled Internet of Vehicles in Smart Transportation.
IEEE Trans. Intell. Transp. Syst., February, 2023
A Provably Secure Lightweight Key Agreement Protocol for Wireless Body Area Networks in Healthcare System.
IEEE Trans. Ind. Informatics, 2023
LAS-SG: An Elliptic Curve-Based Lightweight Authentication Scheme for Smart Grid Environments.
IEEE Trans. Ind. Informatics, 2023
CoRR, 2023
Securing High-Resolution Images From Unmanned Aerial Vehicles With DNA Encoding and Bit-Plane Extraction Method.
IEEE Access, 2023
BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment.
IEEE Access, 2023
IEEE Access, 2023
Reliable and Resilient Communication in Duty Cycled Software Defined Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Communications, 2023
2022
IEEE Trans. Intell. Transp. Syst., 2022
An Efficient and Provably Secure Certificateless Protocol for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
PFLUA-DIoT: A Pairing Free Lightweight and Unlinkable User Access Control Scheme for Distributed IoT Environments.
IEEE Syst. J., 2022
Secur. Commun. Networks, 2022
J. Ambient Intell. Humaniz. Comput., 2022
IEEE Internet Things J., 2022
A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles.
Int. J. Distributed Sens. Networks, 2022
Digit. Commun. Networks, 2022
Comput. Stand. Interfaces, 2022
A seamless anonymous authentication protocol for mobile edge computing infrastructure.
Comput. Commun., 2022
An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing.
Comput. Networks, 2022
Guest Editorial: Introduction to the special section on security and privacy in the big data era (VSI-spbd).
Comput. Electr. Eng., 2022
Comput. Electr. Eng., 2022
REAS-TMIS: Resource-Efficient Authentication Scheme for Telecare Medical Information System.
IEEE Access, 2022
Designing an Enhanced User Authenticated Key Management Scheme for 6G-Based Industrial Applications.
IEEE Access, 2022
2021
IEEE Trans. Reliab., 2021
Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment.
ACM Trans. Internet Techn., 2021
A Novel Pairing-Free Lightweight Authentication Protocol for Mobile Cloud Computing Framework.
IEEE Syst. J., 2021
IEEE Syst. J., 2021
DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre.
Secur. Commun. Networks, 2021
Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles.
Secur. Commun. Networks, 2021
Multim. Tools Appl., 2021
Comment on 'ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications'.
IET Networks, 2021
IEEE Commun. Stand. Mag., 2021
A secure and lightweight authentication scheme for next generation IoT infrastructure.
Comput. Commun., 2021
A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment.
Comput. Networks, 2021
Comput. Networks, 2021
Comput. Networks, 2021
PASKE-IoD: Privacy-Protecting Authenticated Key Establishment for Internet of Drones.
IEEE Access, 2021
IEEE Access, 2021
A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System.
Proceedings of the International Conference on Communications, 2021
2020
Wirel. Pers. Commun., 2020
A Privacy Preserving Authentication Scheme for Roaming in IoT-Based Wireless Mobile Networks.
Symmetry, 2020
Machine Learning Algorithms for Smart Data Analysis in Internet of Things Environment: Taxonomies and Research Trends.
Symmetry, 2020
Sixth Generation (6G) Wireless Networks: Vision, Research Activities, Challenges and Potential Solutions.
Symmetry, 2020
A robust authentication and access control protocol for securing wireless healthcare sensor networks.
J. Inf. Secur. Appl., 2020
A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things.
Int. J. Commun. Syst., 2020
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems.
Comput. Commun., 2020
A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems.
IEEE Access, 2020
Securing Demand Response Management: A Certificate-Based Access Control in Smart Grid Edge Computing Infrastructure.
IEEE Access, 2020
ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments.
IEEE Access, 2020
Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles.
IEEE Access, 2020
2019
An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre.
IEEE Syst. J., 2019
Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography.
Sensors, 2019
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment.
Mob. Networks Appl., 2019
An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol.
Inf. Technol. Control., 2019
Comments on "Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment".
IEEE Internet Things J., 2019
An enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure.
Int. J. Commun. Syst., 2019
Performance analysis of secure communications over correlated slow-fading additive white Gaussian noise channels.
Int. J. Commun. Syst., 2019
A provable and secure mobile user authentication scheme for mobile cloud computing services.
Int. J. Commun. Syst., 2019
Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key.
Int. J. Commun. Syst., 2019
An improved anonymous authentication scheme for distributed mobile cloud computing services.
Clust. Comput., 2019
2018
An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data.
J. Supercomput., 2018
J. Supercomput., 2018
An improved and robust biometrics-based three factor authentication scheme for multiserver environments.
J. Supercomput., 2018
An improved and secure chaotic map based authenticated key agreement in multi-server architecture.
Multim. Tools Appl., 2018
A secure mutual authenticated key agreement of user with multiple servers for critical systems.
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
KSII Trans. Internet Inf. Syst., 2018
Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee's Scheme.
Inf. Technol. Control., 2018
An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment.
Int. J. Commun. Syst., 2018
Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure.
Future Gener. Comput. Syst., 2018
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication.
Future Gener. Comput. Syst., 2018
2017
An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification.
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks.
Wirel. Pers. Commun., 2017
Comments on "A privacy preserving three-factor authentication protocol for e-health clouds".
J. Supercomput., 2017
Peer-to-Peer Netw. Appl., 2017
Peer-to-Peer Netw. Appl., 2017
A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme.
Multim. Tools Appl., 2017
An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems.
Multim. Tools Appl., 2017
Security Vulnerabilities and Improvements of SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks.
Inf. Technol. Control., 2017
A robust ElGamal-based password-authentication protocol using smart card for client-server communication.
Int. J. Commun. Syst., 2017
Int. J. Commun. Syst., 2017
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security.
Int. J. Commun. Syst., 2017
Clust. Comput., 2017
Comput. Electr. Eng., 2017
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management".
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017
2016
An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client-Client Networks.
Wirel. Pers. Commun., 2016
An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre.
J. Supercomput., 2016
Secur. Commun. Networks, 2016
A secure biometric based multi-server authentication scheme for social multimedia networks.
Multim. Tools Appl., 2016
A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.
J. Medical Syst., 2016
A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Syst., 2016
An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services.
KSII Trans. Internet Inf. Syst., 2016
An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture.
KSII Trans. Internet Inf. Syst., 2016
A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography.
Electron. Commer. Res., 2016
A lightweight message authentication scheme for Smart Grid communications in power sector.
Comput. Electr. Eng., 2016
2015
An enhanced privacy preserving remote user authentication scheme with provable security.
Secur. Commun. Networks, 2015
A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2015
An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography.
Multim. Tools Appl., 2015
Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems.
J. Medical Syst., 2015
An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.
J. Medical Syst., 2015
An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks.
Inf. Technol. Control., 2015
Comment on 'Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications'.
IET Commun., 2015
A Secure Authentication Scheme for Session Initiation Protocol Based on Elliptic Curve Cryptography.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme.
Secur. Commun. Networks, 2014
2012
An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem.
Proceedings of 9th IEEE International Conference on Networking, Sensing and Control, 2012
Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem.
Proceedings of the Information Systems, Technology and Management, 2012
2010
Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010