SK Hafizul Islam
Orcid: 0000-0002-2703-0213Affiliations:
- Indian Institute of Information Technology Kalyani (IIIT Kalyani), Department of Computer Science and Engineering, India
- Birla Institute of Technology and Science Pilani (BITS Pilani), Centre for Software Development, India
- Indian School of Mines (ISM), Dhanbad, India (PhD 2013)
According to our database1,
SK Hafizul Islam
authored at least 143 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
CCM-PRNG: Pseudo-random bit generator based on cross-over chaotic map and its application in image encryption.
Multim. Tools Appl., October, 2024
Private Blockchain-Assisted Certificateless Public Key Encryption With Multikeyword Search for Fog-Based IIoT Environments.
IEEE Internet Things J., October, 2024
Internet Things, April, 2024
IoT-ID3PAKA: Efficient and Robust ID-3PAKA Protocol for Resource-Constrained IoT Devices.
IEEE Internet Things J., March, 2024
PF-IBDA: Provably secure and pairing-free identity-based deniable authentication protocol for MANET environments.
Comput. Networks, January, 2024
Blockchain-Based User Authentication and Data-Sharing Framework for Healthcare Industries.
IEEE Trans. Netw. Sci. Eng., 2024
2F-MASK-VSS: Two-factor mutual authentication and session key agreement scheme for video surveillance system.
J. Syst. Archit., 2024
CBIF-M: A content-based image filtering and retrieval scheme using multi-classifier filtering framework.
Comput. Electr. Eng., 2024
Quantum-attack-resilience OTP-based multi-factor mutual authentication and session key agreement scheme for mobile users.
Comput. Electr. Eng., 2024
Proceedings of the 37th IEEE International System-on-Chip Conference, 2024
2023
MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication.
IEEE Syst. J., December, 2023
An object detection-based few-shot learning approach for multimedia quality assessment.
Multim. Syst., October, 2023
Robust authenticated key agreement protocol for internet of vehicles-envisioned intelligent transportation system.
J. Syst. Archit., September, 2023
Secure and efficient image retrieval through invariant features selection in insecure cloud environments.
Neural Comput. Appl., March, 2023
A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT.
J. Syst. Archit., March, 2023
Cybersecurity Attack-Resilience Authentication Mechanism for Intelligent Healthcare System.
IEEE Trans. Ind. Informatics, 2023
IoT-RRHM: Provably secure IoT-based real-time remote healthcare monitoring framework.
J. Syst. Archit., 2023
Provably secure public key encryption with keyword search for data outsourcing in cloud environments.
J. Syst. Archit., 2023
Private Blockchain Envisioned Access Control System for Securing Industrial IoT-Based Pervasive Edge Computing.
IEEE Access, 2023
Chapter Four - A novel image encryption and decryption scheme by using DNA computing.
Adv. Comput., 2023
BCTPV-NIZK: Publicly-Verifiable Non-interactive Zero-Knowledge Proof System from Minimal Blockchain Assumptions.
Proceedings of the Information Systems Security - 19th International Conference, 2023
DL-CMFD: Deep Learning-Based Copy-Move Forgery Detection Using Parallel Feature-Extractor.
Proceedings of the International Conference on Computer, 2023
2022
A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments.
Wirel. Networks, 2022
Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications.
Multim. Tools Appl., 2022
Radiological image retrieval technique using multi-resolution texture and shape features.
Multim. Tools Appl., 2022
Deep learning techniques for observing the impact of the global warming from satellite images of water-bodies.
Multim. Tools Appl., 2022
Clustering-based Optimal Resource Allocation Strategy in Title Insurance Underwriting.
Proceedings of the International Conference on Computer, 2022
Springer, ISBN: 978-3-030-93087-5, 2022
2021
Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF.
IEEE Trans. Veh. Technol., 2021
J. Supercomput., 2021
Provably Secure and Lightweight Identity-Based Authenticated Data Sharing Protocol for Cyber-Physical Cloud Environment.
IEEE Trans. Cloud Comput., 2021
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments.
IEEE Syst. J., 2021
LAAC: Lightweight Lattice-Based Authentication and Access Control Protocol for E-Health Systems in IoT Environments.
IEEE Syst. J., 2021
Secur. Commun. Networks, 2021
DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre.
Secur. Commun. Networks, 2021
A Trusted Consensus Scheme for Collaborative Learning in the Edge AI Computing Domain.
IEEE Netw., 2021
A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance.
J. Syst. Archit., 2021
Provably secure and biometric-based secure access of e-Governance services using mobile devices.
J. Inf. Secur. Appl., 2021
J. Inf. Secur. Appl., 2021
Provably secure biometric-based client-server secure communication over unreliable networks.
J. Inf. Secur. Appl., 2021
J. Inf. Secur. Appl., 2021
PB-3PAKA: Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments.
J. Inf. Secur. Appl., 2021
Secure content-based image retrieval using modified Euclidean distance for encrypted features.
Trans. Emerg. Telecommun. Technol., 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the International Conference on Computer, 2021
Machine Learning-based Currency Information Retrieval for Aiding the Visually Impaired People.
Proceedings of the International Conference on Computer, 2021
Proceedings of the International Conference on Communications, 2021
Proceedings of the Bioengineering and Biomedical Signal and Image Processing, 2021
2020
A heterogeneous user authentication and key establishment for mobile client-server environment.
Wirel. Networks, 2020
Efficient and Secure Anonymous Authentication With Location Privacy for IoT-Based WBANs.
IEEE Trans. Ind. Informatics, 2020
Intelligent Secure Ecosystem Based on Metaheuristic and Functional Link Neural Network for Edge of Things.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Consumer Electron., 2020
Secur. Priv., 2020
Provably secure identity-based two-party authenticated key agreement protocol based on CBi-ISIS and Bi-ISIS problems on lattices.
J. Inf. Secur. Appl., 2020
Provably secure two-party authenticated key agreement protocol for post-quantum environments.
J. Inf. Secur. Appl., 2020
A robust authentication and access control protocol for securing wireless healthcare sensor networks.
J. Inf. Secur. Appl., 2020
An enhanced and provably secure multi-factor authentication scheme for Internet-of-Multimedia-Things environments.
Comput. Electr. Eng., 2020
A Novel Identity-based Deniable Authentication Protocol Using Bilinear Pairings for Mobile Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2020
IEEE Access, 2020
An Improved Authentication Scheme for Remote Data Access and Sharing Over Cloud Storage in Cyber-Physical-Social-Systems.
IEEE Access, 2020
Proceedings of the International Conference on Computer, 2020
Proceedings of the International Conference on Communications, 2020
2019
Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System.
IEEE J. Biomed. Health Informatics, 2019
Security analysis on "mutual authentication scheme for multimedia medical information systems".
Secur. Priv., 2019
Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs.
Inf. Sci., 2019
Inf. Sci., 2019
MGPV: A novel and efficient scheme for secure data sharing among mobile users in the public cloud.
Future Gener. Comput. Syst., 2019
A novel machine learning based feature selection for motor imagery EEG signal classification in Internet of medical things environment.
Future Gener. Comput. Syst., 2019
A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs.
Comput. Networks, 2019
An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system.
Comput. Methods Programs Biomed., 2019
Applying an ensemble convolutional neural network with Savitzky-Golay filter to construct a phonocardiogram prediction model.
Appl. Soft Comput., 2019
Proceedings of the 2019 International Conference on Computer, 2019
2018
Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments.
IEEE Trans. Ind. Informatics, 2018
Secur. Priv., 2018
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks.
Multim. Tools Appl., 2018
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multim. Tools Appl., 2018
A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication.
Multim. Tools Appl., 2018
An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks.
J. Netw. Comput. Appl., 2018
Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments.
IEEE Internet Things J., 2018
A Provably Secure Three-Factor Session Initiation Protocol for Multimedia Big Data Communications.
IEEE Internet Things J., 2018
Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES.
Int. J. Commun. Syst., 2018
Anonymous and expeditious mobile user authentication scheme for GLOMONET environments.
Int. J. Commun. Syst., 2018
A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor.
Int. J. Ad Hoc Ubiquitous Comput., 2018
A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs.
Future Gener. Comput. Syst., 2018
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment.
Future Gener. Comput. Syst., 2018
An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment.
Future Gener. Comput. Syst., 2018
A robust and anonymous patient monitoring system using wireless medical sensor networks.
Future Gener. Comput. Syst., 2018
Ad Hoc Networks, 2018
Proceedings of the 2018 IEEE International Conference on Smart Cloud, 2018
2017
A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks.
Wirel. Pers. Commun., 2017
A software agent enabled biometric security algorithm for secure file access in consumer storage devices.
IEEE Trans. Consumer Electron., 2017
Secur. Commun. Networks, 2017
A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication.
J. King Saud Univ. Comput. Inf. Sci., 2017
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments.
J. King Saud Univ. Comput. Inf. Sci., 2017
Security Vulnerabilities and Improvements of SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks.
Inf. Technol. Control., 2017
A robust ElGamal-based password-authentication protocol using smart card for client-server communication.
Int. J. Commun. Syst., 2017
An anonymous and robust multi-server authentication protocol using multiple registration servers.
Int. J. Commun. Syst., 2017
A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2017
Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme.
Proceedings of the Mathematics and Computing - Third International Conference, 2017
2016
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
Wirel. Pers. Commun., 2016
An effective key distribution for secure internet pay-TV using access key hierarchies.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Security analysis and design of an efficient ECC-based two-factor password authentication scheme.
Secur. Commun. Networks, 2016
An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design.
Secur. Commun. Networks, 2016
Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor.
Secur. Commun. Networks, 2016
A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.
Secur. Commun. Networks, 2016
Int. J. Commun. Syst., 2016
Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks.
Int. J. Commun. Syst., 2016
Design and analysis of an improved smartcard-based remote user password authentication scheme.
Int. J. Commun. Syst., 2016
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks.
Comput. Networks, 2016
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016
2015
Provably secure one-round certificateless authenticated group key agreement protocol for secure communications.
Wirel. Pers. Commun., 2015
Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps.
Wirel. Pers. Commun., 2015
Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys.
Wirel. Pers. Commun., 2015
Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing.
Secur. Commun. Networks, 2015
Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing.
Secur. Commun. Networks, 2015
Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
J. Medical Syst., 2015
Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.
J. Medical Syst., 2015
An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Syst., 2015
Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system.
J. King Saud Univ. Comput. Inf. Sci., 2015
Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps.
Inf. Sci., 2015
A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks.
Concurr. Comput. Pract. Exp., 2015
Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings.
Comput. J., 2015
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015
2014
A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL Attack.
Wirel. Pers. Commun., 2014
Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems.
J. Medical Syst., 2014
Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings.
J. King Saud Univ. Comput. Inf. Sci., 2014
A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings.
J. King Saud Univ. Comput. Inf. Sci., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Recent Advances in Information Technology, 2014
2013
Design of improved password authentication and update scheme based on elliptic curve cryptography.
Math. Comput. Model., 2013
Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings.
J. King Saud Univ. Comput. Inf. Sci., 2013
Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2013
2012
A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks.
Ann. des Télécommunications, 2012
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012
Certificateless strong designated verifier multisignature scheme using bilinear pairings.
Proceedings of the 2012 International Conference on Advances in Computing, 2012
2011
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem.
J. Syst. Softw., 2011
Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment.
Proceedings of the Advances in Computing and Communications, 2011