Ashok Kumar Das

According to our database1, Ashok Kumar Das
  • authored at least 129 papers between 2005 and 2018.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multimedia Tools Appl., 2018

Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks.
IEEE Internet of Things Journal, 2018

A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor.
IJAHUC, 2018

A new two-server authentication and key agreement protocol for accessing secure cloud services.
Computer Networks, 2018

SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment.
IEEE Communications Magazine, 2018

Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions.
IEEE Consumer Electronics Magazine, 2018

Introduction to the special section on Big data and IoT in e-healthcare.
Computers & Electrical Engineering, 2018

Mixed Unit Interval Bigraphs.
Proceedings of the Algorithms and Discrete Applied Mathematics, 2018

2017
A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks.
Wireless Personal Communications, 2017

A Multi-server Environment with Secure and Efficient Remote User Authentication Scheme Based on Dynamic ID Using Smart Cards.
Wireless Personal Communications, 2017

A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2017

A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2017

A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks.
Wireless Personal Communications, 2017

Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment.
IEEE Trans. Industrial Informatics, 2017

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Network and Computer Applications, 2017

Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment.
IEEE Internet of Things Journal, 2017

Robust Anonymous Mutual Authentication Scheme for n-Times Ubiquitous Mobile Cloud Computing Services.
IEEE Internet of Things Journal, 2017

A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor.
Int. J. Communication Systems, 2017

Provably secure authenticated key agreement scheme for distributed mobile cloud computing services.
Future Generation Comp. Syst., 2017

Design of a provably secure biometrics-based multi-cloud-server authentication scheme.
Future Generation Comp. Syst., 2017

Graphs and digraphs represented by intervals and circular arcs.
Discrete Applied Mathematics, 2017

Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment.
Computer Standards & Interfaces, 2017

On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2017

Lightweight authentication protocols for wearable devices.
Computers & Electrical Engineering, 2017

An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks.
Annales des Télécommunications, 2017

Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks.
IEEE Access, 2017

On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services.
IEEE Access, 2017

Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks.
IEEE Access, 2017

Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts.
IEEE Access, 2017

Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices.
IEEE Access, 2017

On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems.
IEEE Access, 2017

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications.
IEEE Access, 2017

Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment.
IEEE Access, 2017

2016
An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks.
Wireless Personal Communications, 2016

A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography.
Wireless Personal Communications, 2016

A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
Wireless Personal Communications, 2016

SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms.
IEEE Trans. Consumer Electronics, 2016

A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks.
Security and Communication Networks, 2016

Provably secure biometric-based user authentication and key agreement scheme in cloud computing.
Security and Communication Networks, 2016

Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS.
Security and Communication Networks, 2016

Design of sinkhole node detection mechanism for hierarchical wireless sensor networks.
Security and Communication Networks, 2016

Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography.
Security and Communication Networks, 2016

An anonymous and secure biometric-based enterprise digital rights management system for mobile environment.
Security and Communication Networks, 2016

An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks.
Security and Communication Networks, 2016

A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks.
Security and Communication Networks, 2016

Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor.
Security and Communication Networks, 2016

Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks.
Security and Communication Networks, 2016

An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.
Security and Communication Networks, 2016

Provably secure user authentication and key agreement scheme for wireless sensor networks.
Security and Communication Networks, 2016

Provably secure three-factor authentication and key agreement scheme for session initiation protocol.
Security and Communication Networks, 2016

A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card.
Peer-to-Peer Networking and Applications, 2016

A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks.
Peer-to-Peer Networking and Applications, 2016

Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
Multimedia Tools Appl., 2016

Analysis of Security Protocols for Mobile Healthcare.
J. Medical Systems, 2016

An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards.
TIIS, 2016

Design of a secure smart card-based multi-server authentication scheme.
J. Inf. Sec. Appl., 2016

A secure and efficient time-bound hierarchical access control scheme for secure broadcasting.
IJAHUC, 2016

Lightweight authentication with key-agreement protocol for mobile network environment using smart cards.
IET Information Security, 2016

A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps.
Future Generation Comp. Syst., 2016

Forbidden substructure for interval digraphs/bigraphs.
Discrete Mathematics, 2016

Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.
Computer Methods and Programs in Biomedicine, 2016

Secure anonymous mutual authentication for star two-tier wireless body area networks.
Computer Methods and Programs in Biomedicine, 2016

An efficient fast algorithm for discovering closed+ high utility itemsets.
Appl. Intell., 2016

A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography.
IEEE Access, 2016

An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Forbidden Subgraphs of Bigraphs of Ferrers Dimension 2.
Proceedings of the Theoretical Computer Science and Discrete Mathematics, 2016

2015
A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks.
Wireless Personal Communications, 2015

An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems.
Wireless Personal Communications, 2015

DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks.
Wireless Personal Communications, 2015

A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks.
Wireless Personal Communications, 2015

A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards.
IEEE Trans. Information Forensics and Security, 2015

An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards.
Security and Communication Networks, 2015

A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks.
Security and Communication Networks, 2015

An anonymous and secure biometric-based enterprise digital rights management system for mobile environment.
Security and Communication Networks, 2015

An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks.
Security and Communication Networks, 2015

An effective association rule mining scheme using a new generic basis.
Knowl. Inf. Syst., 2015

A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.
J. Medical Systems, 2015

A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems.
J. Medical Systems, 2015

A Secure and Robust Password-Based Remote User Authentication Scheme Using Smart Cards for the Integrated EPR Information System.
J. Medical Systems, 2015

An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card.
J. Inf. Sec. Appl., 2015

A secure password-based authentication and key agreement scheme using smart cards.
J. Inf. Sec. Appl., 2015

An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks.
IJCNDS, 2015

A secure and effective access control scheme for distributed wireless sensor networks.
IJCNDS, 2015

An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices.
IACR Cryptology ePrint Archive, 2015

An efficient approach for mining association rules from high utility itemsets.
Expert Syst. Appl., 2015

A New Biometric-Based Remote User Authentication Scheme in Hierarchical Wireless Body Area Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2015

New Characterizations of Proper Interval Bigraphs and Proper Circular Arc Bigraphs.
Proceedings of the Algorithms and Discrete Applied Mathematics, 2015

2014
An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function.
J. Medical Systems, 2014

A secure effective key management scheme for dynamic access control in a large leaf class hierarchy.
Inf. Sci., 2014

Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks.
IJTMCC, 2014

A survey on user access control in wireless sensor networks with formal security verification.
IJTMCC, 2014

An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function.
IJCNDS, 2014

Cryptanalysis on 'Robust Biometrics-Based Authentication Scheme for Multi-server Environment'.
IACR Cryptology ePrint Archive, 2014

On the Security of 'An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'.
IACR Cryptology ePrint Archive, 2014

A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards.
Expert Syst. Appl., 2014

An Algorithm for Mining High Utility Closed Itemsets and Generators.
CoRR, 2014

An Enhanced Access Control Scheme in Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2014

Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications, 2014

Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications, 2014

2013
A New Key Management Scheme for a User Hierarchy based on a Hybrid Cryptosystem.
Smart CR, 2013

An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System.
J. Medical Systems, 2013

A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care.
J. Medical Systems, 2013

An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System.
J. Medical Systems, 2013

A novel linear polynomial-based dynamic key management scheme for hierarchical access control.
IJTMCC, 2013

A Novel Efficient Access Control Scheme for Large-Scale Distributed Wireless Sensor Networks.
Int. J. Found. Comput. Sci., 2013

Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

LHSC: An effective dynamic key management scheme for linear hierarchical access control.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks.
J. Network and Computer Applications, 2012

Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem.
Inf. Sci., 2012

Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks.
I. J. Network Security, 2012

A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks.
Int. J. Inf. Sec., 2012

A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

2011
An efficient random key distribution scheme for large-scale distributed sensor networks.
Security and Communication Networks, 2011

An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks.
JCP, 2011

Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards.
IET Information Security, 2011

A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge
CoRR, 2011

An Unconditionally Secure Key Management Scheme for Large-Scale Heterogeneous Wireless Sensor Networks
CoRR, 2011

An Identity Based Key Management Scheme in Wireless Sensor Networks
CoRR, 2011

An Improved Efficient Key Distribution Mechanism for Large-Scale Heterogeneous Mobile Sensor Networks
CoRR, 2011

Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards
CoRR, 2011

2009
A Location-Adaptive Key Establishment Scheme for Large-Scale Distributed Wireless Sensor Networks.
JCP, 2009

2008
ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks.
I. J. Network Security, 2008

An Identity-ased Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks.
I. J. Network Security, 2008

An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

2007
A Key Establishment Scheme for Large-Scale Mobile Wireless Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2007

2005
Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks.
Proceedings of the Distributed Computing, 2005

A Key Reshuffling Scheme for Wireless Sensor Networks.
Proceedings of the Information Systems Security, First International Conference, 2005


  Loading...