SK Hafizul Islam

Orcid: 0000-0002-2703-0213

Affiliations:
  • Indian Institute of Information Technology Kalyani (IIIT Kalyani), Department of Computer Science and Engineering, India
  • Birla Institute of Technology and Science Pilani (BITS Pilani), Centre for Software Development, India
  • Indian School of Mines (ISM), Dhanbad, India (PhD 2013)


According to our database1, SK Hafizul Islam authored at least 143 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CCM-PRNG: Pseudo-random bit generator based on cross-over chaotic map and its application in image encryption.
Multim. Tools Appl., October, 2024

Private Blockchain-Assisted Certificateless Public Key Encryption With Multikeyword Search for Fog-Based IIoT Environments.
IEEE Internet Things J., October, 2024

A survey on security and cryptographic perspective of Industrial-Internet-of-Things.
Internet Things, April, 2024

IoT-ID3PAKA: Efficient and Robust ID-3PAKA Protocol for Resource-Constrained IoT Devices.
IEEE Internet Things J., March, 2024

PF-IBDA: Provably secure and pairing-free identity-based deniable authentication protocol for MANET environments.
Comput. Networks, January, 2024

Blockchain-Based User Authentication and Data-Sharing Framework for Healthcare Industries.
IEEE Trans. Netw. Sci. Eng., 2024

2F-MASK-VSS: Two-factor mutual authentication and session key agreement scheme for video surveillance system.
J. Syst. Archit., 2024

CBIF-M: A content-based image filtering and retrieval scheme using multi-classifier filtering framework.
Comput. Electr. Eng., 2024

Quantum-attack-resilience OTP-based multi-factor mutual authentication and session key agreement scheme for mobile users.
Comput. Electr. Eng., 2024

Quantum Implementation of Linear and Non-Linear Layers.
Proceedings of the 37th IEEE International System-on-Chip Conference, 2024

2023
MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication.
IEEE Syst. J., December, 2023

An object detection-based few-shot learning approach for multimedia quality assessment.
Multim. Syst., October, 2023

Robust authenticated key agreement protocol for internet of vehicles-envisioned intelligent transportation system.
J. Syst. Archit., September, 2023

Secure and efficient image retrieval through invariant features selection in insecure cloud environments.
Neural Comput. Appl., March, 2023

A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT.
J. Syst. Archit., March, 2023

Cybersecurity Attack-Resilience Authentication Mechanism for Intelligent Healthcare System.
IEEE Trans. Ind. Informatics, 2023

IoT-RRHM: Provably secure IoT-based real-time remote healthcare monitoring framework.
J. Syst. Archit., 2023

Provably secure public key encryption with keyword search for data outsourcing in cloud environments.
J. Syst. Archit., 2023

Private Blockchain Envisioned Access Control System for Securing Industrial IoT-Based Pervasive Edge Computing.
IEEE Access, 2023

Chapter Four - A novel image encryption and decryption scheme by using DNA computing.
Adv. Comput., 2023

BCTPV-NIZK: Publicly-Verifiable Non-interactive Zero-Knowledge Proof System from Minimal Blockchain Assumptions.
Proceedings of the Information Systems Security - 19th International Conference, 2023

DL-CMFD: Deep Learning-Based Copy-Move Forgery Detection Using Parallel Feature-Extractor.
Proceedings of the International Conference on Computer, 2023

2022
A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments.
Wirel. Networks, 2022

Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications.
Multim. Tools Appl., 2022

Radiological image retrieval technique using multi-resolution texture and shape features.
Multim. Tools Appl., 2022

Deep learning techniques for observing the impact of the global warming from satellite images of water-bodies.
Multim. Tools Appl., 2022

Clustering-based Optimal Resource Allocation Strategy in Title Insurance Underwriting.
Proceedings of the International Conference on Computer, 2022

Data Classification and Incremental Clustering in Data Mining and Machine Learning
Springer, ISBN: 978-3-030-93087-5, 2022

2021
Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF.
IEEE Trans. Veh. Technol., 2021

A secure blockchain-based group key agreement protocol for IoT.
J. Supercomput., 2021

Provably Secure and Lightweight Identity-Based Authenticated Data Sharing Protocol for Cyber-Physical Cloud Environment.
IEEE Trans. Cloud Comput., 2021

A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments.
IEEE Syst. J., 2021

LAAC: Lightweight Lattice-Based Authentication and Access Control Protocol for E-Health Systems in IoT Environments.
IEEE Syst. J., 2021

Improved ECC-Based Three-Factor Multiserver Authentication Scheme.
Secur. Commun. Networks, 2021

DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre.
Secur. Commun. Networks, 2021

A Trusted Consensus Scheme for Collaborative Learning in the Edge AI Computing Domain.
IEEE Netw., 2021

A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance.
J. Syst. Archit., 2021

Provably secure and biometric-based secure access of e-Governance services using mobile devices.
J. Inf. Secur. Appl., 2021

Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security.
J. Inf. Secur. Appl., 2021

Provably secure biometric-based client-server secure communication over unreliable networks.
J. Inf. Secur. Appl., 2021

A comprehensive review on collision-resistant hash functions on lattices.
J. Inf. Secur. Appl., 2021

PB-3PAKA: Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments.
J. Inf. Secur. Appl., 2021

Secure content-based image retrieval using modified Euclidean distance for encrypted features.
Trans. Emerg. Telecommun. Technol., 2021

Encrypted Medical Image Storage in DNA Domain.
Proceedings of the ICC 2021, 2021

A Reinforced Dynamic Multi-keyword Ranked Search with Forward Privacy.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

Efficient and Secure Design of ID-3PAKA Protocol Using ECC.
Proceedings of the International Conference on Computer, 2021

Machine Learning-based Currency Information Retrieval for Aiding the Visually Impaired People.
Proceedings of the International Conference on Computer, 2021

Classification of Soil Images using Convolution Neural Networks.
Proceedings of the International Conference on Communications, 2021

Trident U-Net: An Encoder Fusion for Improved Biomedical Image Segmentation.
Proceedings of the Bioengineering and Biomedical Signal and Image Processing, 2021

2020
A heterogeneous user authentication and key establishment for mobile client-server environment.
Wirel. Networks, 2020

Efficient and Secure Anonymous Authentication With Location Privacy for IoT-Based WBANs.
IEEE Trans. Ind. Informatics, 2020

Intelligent Secure Ecosystem Based on Metaheuristic and Functional Link Neural Network for Edge of Things.
IEEE Trans. Ind. Informatics, 2020

A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices.
IEEE Trans. Consumer Electron., 2020

Model based IoT security framework using multiclass adaptive boosting with SMOTE.
Secur. Priv., 2020

Provably secure identity-based two-party authenticated key agreement protocol based on CBi-ISIS and Bi-ISIS problems on lattices.
J. Inf. Secur. Appl., 2020

Provably secure two-party authenticated key agreement protocol for post-quantum environments.
J. Inf. Secur. Appl., 2020

A robust authentication and access control protocol for securing wireless healthcare sensor networks.
J. Inf. Secur. Appl., 2020

An enhanced and provably secure multi-factor authentication scheme for Internet-of-Multimedia-Things environments.
Comput. Electr. Eng., 2020

A Novel Identity-based Deniable Authentication Protocol Using Bilinear Pairings for Mobile Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2020

IEEE Access Special Section Editorial: Security and Privacy for Cloud and IoT.
IEEE Access, 2020

An Improved Authentication Scheme for Remote Data Access and Sharing Over Cloud Storage in Cyber-Physical-Social-Systems.
IEEE Access, 2020

A Secure Authentication Mechanism for Wireless Sensor Networks.
Proceedings of the International Conference on Computer, 2020

A Post Dynamic Clustering Approach for Classification-based Image Retrieval.
Proceedings of the International Conference on Communications, 2020

2019
Secure CLS and CL-AS schemes designed for VANETs.
J. Supercomput., 2019

Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System.
IEEE J. Biomed. Health Informatics, 2019

Security analysis on "mutual authentication scheme for multimedia medical information systems".
Secur. Priv., 2019

Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs.
Inf. Sci., 2019

A lightweight machine learning-based authentication framework for smart IoT devices.
Inf. Sci., 2019

MGPV: A novel and efficient scheme for secure data sharing among mobile users in the public cloud.
Future Gener. Comput. Syst., 2019

A novel machine learning based feature selection for motor imagery EEG signal classification in Internet of medical things environment.
Future Gener. Comput. Syst., 2019

A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs.
Comput. Networks, 2019

An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system.
Comput. Methods Programs Biomed., 2019

Applying an ensemble convolutional neural network with Savitzky-Golay filter to construct a phonocardiogram prediction model.
Appl. Soft Comput., 2019

A Secure Identity-based Deniable Authentication Protocol for MANETs.
Proceedings of the 2019 International Conference on Computer, 2019

2018
Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments.
IEEE Trans. Ind. Informatics, 2018

A comparative study and analysis of some pseudorandom number generator algorithms.
Secur. Priv., 2018

Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks.
Multim. Tools Appl., 2018

A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multim. Tools Appl., 2018

A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication.
Multim. Tools Appl., 2018

An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks.
J. Netw. Comput. Appl., 2018

A pairing-free and provably secure certificateless signature scheme.
Inf. Sci., 2018

Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments.
IEEE Internet Things J., 2018

A Provably Secure Three-Factor Session Initiation Protocol for Multimedia Big Data Communications.
IEEE Internet Things J., 2018

Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES.
Int. J. Commun. Syst., 2018

Anonymous and expeditious mobile user authentication scheme for GLOMONET environments.
Int. J. Commun. Syst., 2018

A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor.
Int. J. Ad Hoc Ubiquitous Comput., 2018

A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs.
Future Gener. Comput. Syst., 2018

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment.
Future Gener. Comput. Syst., 2018

An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment.
Future Gener. Comput. Syst., 2018

A robust and anonymous patient monitoring system using wireless medical sensor networks.
Future Gener. Comput. Syst., 2018

A robust mutual authentication protocol for WSN with multiple base-stations.
Ad Hoc Networks, 2018

ES3B: Enhanced Security System for Smart Building Using IoT.
Proceedings of the 2018 IEEE International Conference on Smart Cloud, 2018

2017
Secure Data Access and Sharing Scheme for Cloud Storage.
Wirel. Pers. Commun., 2017

A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks.
Wirel. Pers. Commun., 2017

A software agent enabled biometric security algorithm for secure file access in consumer storage devices.
IEEE Trans. Consumer Electron., 2017

A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments.
Secur. Commun. Networks, 2017

A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication.
J. King Saud Univ. Comput. Inf. Sci., 2017

An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments.
J. King Saud Univ. Comput. Inf. Sci., 2017

Security Vulnerabilities and Improvements of SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks.
Inf. Technol. Control., 2017

A robust ElGamal-based password-authentication protocol using smart card for client-server communication.
Int. J. Commun. Syst., 2017

An anonymous and robust multi-server authentication protocol using multiple registration servers.
Int. J. Commun. Syst., 2017

A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2017

Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme.
Proceedings of the Mathematics and Computing - Third International Conference, 2017

2016
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
Wirel. Pers. Commun., 2016

An effective key distribution for secure internet pay-TV using access key hierarchies.
Secur. Commun. Networks, 2016

An efficient group key agreement protocol for secure P2P communication.
Secur. Commun. Networks, 2016

Security analysis and design of an efficient ECC-based two-factor password authentication scheme.
Secur. Commun. Networks, 2016

An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design.
Secur. Commun. Networks, 2016

Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor.
Secur. Commun. Networks, 2016

A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.
Secur. Commun. Networks, 2016

An anonymous and provably secure authentication scheme for mobile user.
Int. J. Commun. Syst., 2016

Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks.
Int. J. Commun. Syst., 2016

Design and analysis of an improved smartcard-based remote user password authentication scheme.
Int. J. Commun. Syst., 2016

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks.
Comput. Networks, 2016

Design of an enhanced authentication protocol and its verification using AVISPA.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

2015
Provably secure one-round certificateless authenticated group key agreement protocol for secure communications.
Wirel. Pers. Commun., 2015

Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps.
Wirel. Pers. Commun., 2015

Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys.
Wirel. Pers. Commun., 2015

Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing.
Secur. Commun. Networks, 2015

Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing.
Secur. Commun. Networks, 2015

Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
J. Medical Syst., 2015

Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.
J. Medical Syst., 2015

An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Syst., 2015

Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system.
J. King Saud Univ. Comput. Inf. Sci., 2015

Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps.
Inf. Sci., 2015

A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks.
Concurr. Comput. Pract. Exp., 2015

Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings.
Comput. J., 2015

An efficient remote mutual authentication scheme using smart mobile phone over insecure networks.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

2014
A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL Attack.
Wirel. Pers. Commun., 2014

Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems.
J. Medical Syst., 2014

Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings.
J. King Saud Univ. Comput. Inf. Sci., 2014

A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings.
J. King Saud Univ. Comput. Inf. Sci., 2014

Design of identity-based digital signature schemes using extended chaotic maps.
IACR Cryptol. ePrint Arch., 2014

Identity-based encryption and digital signature schemes using extended chaotic maps.
IACR Cryptol. ePrint Arch., 2014

Design of ECC-Based ElGamal Encryption Scheme Using CL-PKC.
Proceedings of the Recent Advances in Information Technology, 2014

2013
Design of improved password authentication and update scheme based on elliptic curve cryptography.
Math. Comput. Model., 2013

Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings.
J. King Saud Univ. Comput. Inf. Sci., 2013

Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2013

2012
A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks.
Ann. des Télécommunications, 2012

Design of an efficient ID-based short designated verifier proxy signature scheme.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

Certificateless strong designated verifier multisignature scheme using bilinear pairings.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

2011
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem.
J. Syst. Softw., 2011

Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment.
Proceedings of the Advances in Computing and Communications, 2011


  Loading...