Amit K. Awasthi

Orcid: 0000-0002-5500-0361

According to our database1, Amit K. Awasthi authored at least 27 papers between 2003 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Modeling and Analysis of Worm Propagation in Wireless Sensor Networks.
Wirel. Pers. Commun., 2018

2017
Cryptanalysis and Improvement in User Authentication and Key Agreement Scheme for Wireless Sensor Network.
Wirel. Pers. Commun., 2017

Privacy Model for Threshold RFID System Based on PUF.
Wirel. Pers. Commun., 2017

A secure anonymous proxy signcryption scheme.
J. Math. Cryptol., 2017

2016
Security Enhancement of an Improved Remote User Authentication Scheme with Key Agreement.
Wirel. Pers. Commun., 2016

2015
A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System.
J. Medical Syst., 2015

Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement.
IACR Cryptol. ePrint Arch., 2015

2013
RFID Authentication Protocol to Enhance Patient Medication Safety.
J. Medical Syst., 2013

A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce.
J. Medical Syst., 2013

A Review on Remote User Authentication Schemes Using Smart Cards.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

Analysis and Improvement of an Authentication Scheme Using Smart Cards.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

2011
An improved timestamp-based remote user authentication scheme.
Comput. Electr. Eng., 2011

2010
Remarks on the security of the strong proxy signature scheme with proxy signer privacy protection.
Int. J. Inf. Comput. Secur., 2010

2009
Non Homogeneous Poisson Process Model based Optimal Modular Software Testing using Fault Tolerance
CoRR, 2009

2008
On the Security of Liaw et al.'s Scheme
CoRR, 2008

2007
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings.
Int. J. Netw. Secur., 2007

2005
On the Authentication of the User from the Remote Autonomous Object.
Int. J. Netw. Secur., 2005

An Efficient Scheme for Sensitive Message Transmission using Blind Signcryption
CoRR, 2005

A New Remote User Authentication Scheme Using Smart Cards with Check Digits
CoRR, 2005

A Multi-proxy Signature Scheme for Partial delegation with Warrant
CoRR, 2005

2004
An enhanced remote user authentication scheme using smart cards.
IEEE Trans. Consumer Electron., 2004

Security Analysis of A Dynamic ID-based Remote User Authentication Scheme.
IACR Cryptol. ePrint Arch., 2004

Comment on A dynamic ID-based Remote User Authentication Scheme
CoRR, 2004

A New Proxy Ring Signature Scheme
CoRR, 2004

2003
A remote user authentication scheme using smart cards with forward secrecy.
IEEE Trans. Consumer Electron., 2003

A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures.
IACR Cryptol. ePrint Arch., 2003

Proxy Blind Signature Scheme.
IACR Cryptol. ePrint Arch., 2003


  Loading...