VO
Publications
- Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
- A secure and efficient time-bound hierarchical access control scheme for secure broadcasting
- Attribute-based authentication on the cloud for thin clients
- An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems
- An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System
- An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
- Efficient privacy preserving device authentication in WBANs for industrial e-health applications
- A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials
- A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
- A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
- An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function
- Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks
- Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography
- A novel linear polynomial-based dynamic key management scheme for hierarchical access control
- Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function
- A New Key Management Scheme for a User Hierarchy based on a Hybrid Cryptosystem
- LHSC: An effective dynamic key management scheme for linear hierarchical access control
- An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card
- Expert Intelligence: Theory of the Missing Facet
- A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks
- Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks
- An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
- Provably secure user authentication and key agreement scheme for wireless sensor networks
- Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
- Security analysis of an adaptable and scalable group access control scheme for managing wireless sensor networks
- A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks
- A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks
- An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks
- A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS
- An enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography
- Provably secure three-factor authentication and key agreement scheme for session initiation protocol
- A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system
- Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment
- A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
- Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems
- An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards
- DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks
- A user anonymous mutual authentication protocol
- Secure anonymous mutual authentication for star two-tier wireless body area networks
- Analysis of Security Protocols for Mobile Healthcare
- SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms
- A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks
- A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment
- An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments
- Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
- Analysis of A Lightweight Authentication Protocol for Remote Surgery Applications under the CK - Adversary Model
- Security Analysis of a Key Exchange Protocol under Dolev-Yao Threat Model Using Tamarin Prover
- Blockchain-based e-voting protocols
- Provably Secure Pseudo-Identity Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Lightweight Mobile Devices
- A Dynamic Time-Bound Access Control for Secure Hierarchical Content Sharing
- Secure Ultra Fast Authentication Protocol for Electric Vehicle Charging
- Secure Ultra Fast Authentication Protocol for Electric Vehicle Charging
- Jamming resistant non‐interactive anonymous and unlinkable authentication scheme for mobile satellite networks
- An efficient multi‐gateway‐based three‐factor user authentication and key agreement scheme in hierarchical wireless sensor networks
- Design of a new CP‐ABE with constant‐size secret keys for lightweight devices using elliptic curve cryptography