Sujata Mohanty

Orcid: 0000-0002-3502-8201

According to our database1, Sujata Mohanty authored at least 22 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Three-Factor-Based Authentication Scheme of 5G Wireless Sensor Networks for IoT System.
IEEE Internet Things J., September, 2023

2022
An efficient three-factor user authentication scheme for industrial wireless sensor network with fog computing.
Int. J. Commun. Syst., 2022

A Secure Privacy Preserving Authentication Schema for Remote Server Using Biometric.
Proceedings of the Computer Science and Education - 17th International Conference, 2022

2021
A secure three factor based authentication scheme for health care systems using IoT enabled devices.
J. Ambient Intell. Humaniz. Comput., 2021

2020
Improved Biometric-Based Mutual Authentication and Key Agreement Scheme Using ECC.
Wirel. Pers. Commun., 2020

CL-AGKA: certificateless authenticated group key agreement protocol for mobile networks.
Wirel. Networks, 2020

2019
Chaotic Map based Privacy Preservation User Authentication Scheme for WBANs.
Proceedings of the TENCON 2019, 2019

2018
An Improved and Secure Two-factor Dynamic ID Based Authenticated Key Agreement Scheme for Multiserver Environment.
Wirel. Pers. Commun., 2018

Cryptanalysis and Enhancement of an Anonymous Self-Certified Key Exchange Protocol.
Wirel. Pers. Commun., 2018

Design of electronic payment system based on authenticated key exchange.
Electron. Commer. Res., 2018

A Lightweight Biometric-based Authentication Scheme for Telecare Medicine Information Systems Using ECC.
Proceedings of the 9th International Conference on Computing, 2018

Cloud-Assisted Privacy Preserving Authentication Scheme for Telecare Medical Information Systems.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

2017
CLB-ECC: Certificateless Blind Signature Using ECC.
J. Inf. Process. Syst., 2017

Development of Computer Algorithm for Editing of Next Generation Sequencing Metagenome Data.
J. Comput. Biol., 2017

A Light Weight Three Factor based Authentication Scheme for Multi-server Environment using Smart Cards.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

An ID-based Non-Interactive Deniable Authentication Protocol based on ECC.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

2016
BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications.
Comput., 2016

2014
Multi-party Key-Exchange with Perfect Forward Secrecy.
Proceedings of the 2014 International Conference on Information Technology, 2014

2013
A secure electronic cash based on a certificateless group signcryption scheme.
Math. Comput. Model., 2013

2012
A Strong Designated Verifiable DL Based Signcryption Scheme.
J. Inf. Process. Syst., 2012

A novel time-stamped signature scheme based upon DLP.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

2011
A Convertible Designated Verifible Blind Multi-signcryption Scheme.
Proceedings of the Advances in Computing and Communications, 2011


  Loading...