Anup Kumar Maurya

Orcid: 0000-0001-6252-6954

According to our database1, Anup Kumar Maurya authored at least 10 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The use of IoT-based wearable devices to ensure secure lightweight payments in FinTech applications.
J. King Saud Univ. Comput. Inf. Sci., October, 2023

A Novel Energy Efficient Multi-Dimensional Virtual Machines Allocation and Migration at the Cloud Data Center.
IEEE Access, 2023

2021
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters.
J. Syst. Archit., 2021

2020
A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments.
Peer-to-Peer Netw. Appl., 2020

2017
Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things.
Inf., 2017

User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

Secure and Efficient Authenticated Key Exchange Mechanism for Wireless Sensor Networks and Internet of Things Using Bloom Filter.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Symmetric hash function based secure and efficient authenticated key exchange mechanism for wireless sensor networks.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

2015
Cryptanalysis and Improvement of ECC - Based Security Enhanced User Authentication Protocol for Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications, 2015


  Loading...