Ashok Kumar Das

According to our database1, Ashok Kumar Das authored at least 200 papers between 2005 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment.
IEEE Trans. Veh. Technol., 2020

2PBDC: privacy-preserving bigdata collection in cloud environment.
J. Supercomput., 2020

Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment.
IEEE Trans. Ind. Informatics, 2020

Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment.
IEEE Trans. Dependable Secur. Comput., 2020

Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment.
Sensors, 2020

A Smart Waste Management Solution Geared towards Citizens.
Sensors, 2020

An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments.
Sensors, 2020

LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment.
J. Netw. Comput. Appl., 2020

Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment.
J. Inf. Secur. Appl., 2020

Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment.
IEEE Internet Things J., 2020

Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems.
Future Gener. Comput. Syst., 2020

Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment.
Comput. Commun., 2020

A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT.
Comput. Networks, 2020

A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things.
IEEE Access, 2020

Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges.
IEEE Access, 2020

LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things.
IEEE Access, 2020

On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks.
IEEE Access, 2020

BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment.
IEEE Access, 2020

Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges.
IEEE Access, 2020

On the Design of Blockchain-Based Access Control Protocol for IoT-Enabled Healthcare Applications.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Cache Poisoning Prevention Scheme in 5G-enabled Vehicular Networks: A Tangle-based Theoretical Perspective.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment.
IEEE Trans. Veh. Technol., 2019

Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications.
IEEE Trans. Ind. Informatics, 2019

ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System.
IEEE Trans. Ind. Informatics, 2019

Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2019

LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
Sensors, 2019

User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions.
Pervasive Mob. Comput., 2019

Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment.
MONET, 2019

Authentication in cloud-driven IoT-based big data environment: Survey and outlook.
J. Syst. Archit., 2019

A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment.
J. Ambient Intell. Humaniz. Comput., 2019

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications.
ISeCure, 2019

Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment.
IEEE Internet Things J., 2019

AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment.
IEEE Internet Things J., 2019

Certificate-Based Anonymous Device Access Control Scheme for IoT Environment.
IEEE Internet Things J., 2019

A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment.
IEEE Internet Things J., 2019

RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment.
Int. J. Commun. Syst., 2019

Design of secure key management and user authentication scheme for fog computing services.
Future Gener. Comput. Syst., 2019

Government regulations in cyber security: Framework, standards and recommendations.
Future Gener. Comput. Syst., 2019

Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions.
IEEE Consumer Electron. Mag., 2019

IoMT Malware Detection Approaches: Analysis and Research Challenges.
IEEE Access, 2019

A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things.
IEEE Access, 2019

A Mean Quantization Watermarking Scheme for Audio Signals Using Singular-Value Decomposition.
IEEE Access, 2019

Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment.
IEEE Access, 2019

Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions.
IEEE Access, 2019

2018
Secure Message Communication Protocol Among Vehicles in Smart City.
IEEE Trans. Veh. Technol., 2018

Provably Secure Authenticated Key Agreement Scheme for Smart Grid.
IEEE Trans. Smart Grid, 2018

A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers.
J. Supercomput., 2018

Attribute-based authentication on the cloud for thin clients.
J. Supercomput., 2018

A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.
IEEE J. Biomed. Health Informatics, 2018

Providing Healthcare-as-a-Service Using Fuzzy Rule Based Big Data Analytics in Cloud Computing.
IEEE J. Biomed. Health Informatics, 2018

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
IEEE J. Biomed. Health Informatics, 2018

A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks.
Telecommunication Systems, 2018

Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment.
IEEE Trans. Dependable Secur. Comput., 2018

A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multim. Tools Appl., 2018

Authenticated key management protocol for cloud-assisted body area sensor networks.
J. Netw. Comput. Appl., 2018

A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications.
J. Ambient Intell. Humaniz. Comput., 2018

Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography.
J. Ambient Intell. Humaniz. Comput., 2018

Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks.
IEEE Internet Things J., 2018

Secure Healthcare Data Dissemination Using Vehicle Relay Networks.
IEEE Internet Things J., 2018

Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things.
IEEE Internet Things J., 2018

Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment.
IEEE Internet Things J., 2018

On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC.
Int. J. Commun. Syst., 2018

A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor.
Int. J. Ad Hoc Ubiquitous Comput., 2018

On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks.
IACR Cryptol. ePrint Arch., 2018

Taxonomy and analysis of security protocols for Internet of Things.
Future Gener. Comput. Syst., 2018

A new two-server authentication and key agreement protocol for accessing secure cloud services.
Comput. Networks, 2018

LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment.
IEEE Communications Magazine, 2018

SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment.
IEEE Communications Magazine, 2018

Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions.
IEEE Consumer Electron. Mag., 2018

Introduction to the special section on Big data and IoT in e-healthcare.
Comput. Electr. Eng., 2018

An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks.
Comput. Electr. Eng., 2018

2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment.
IEEE Access, 2018

HEAP: An Efficient and Fault-Tolerant Authentication and Key Exchange Protocol for Hadoop-Assisted Big Data Platform.
IEEE Access, 2018

Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment.
IEEE Access, 2018

Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks.
IEEE Access, 2018

LaCSys: Lattice-Based Cryptosystem for Secure Communication in Smart Grid Environment.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Demand Response Management Using Lattice-Based Cryptography in Smart Grids.
Proceedings of the IEEE Global Communications Conference, 2018

Mixed Unit Interval Bigraphs.
Proceedings of the Algorithms and Discrete Applied Mathematics, 2018

2017
A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks.
Wireless Personal Communications, 2017

A Multi-server Environment with Secure and Efficient Remote User Authentication Scheme Based on Dynamic ID Using Smart Cards.
Wireless Personal Communications, 2017

A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2017

A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2017

A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks.
Wireless Personal Communications, 2017

Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment.
IEEE Trans. Ind. Informatics, 2017

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Netw. Comput. Appl., 2017

Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment.
IEEE Internet Things J., 2017

Robust Anonymous Mutual Authentication Scheme for n-Times Ubiquitous Mobile Cloud Computing Services.
IEEE Internet Things J., 2017

A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor.
Int. J. Commun. Syst., 2017

Provably secure authenticated key agreement scheme for distributed mobile cloud computing services.
Future Gener. Comput. Syst., 2017

Design of a provably secure biometrics-based multi-cloud-server authentication scheme.
Future Gener. Comput. Syst., 2017

Graphs and digraphs represented by intervals and circular arcs.
Discret. Appl. Math., 2017

Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment.
Comput. Stand. Interfaces, 2017

On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2017

Lightweight authentication protocols for wearable devices.
Comput. Electr. Eng., 2017

An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks.
Ann. des Télécommunications, 2017

Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks.
IEEE Access, 2017

On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services.
IEEE Access, 2017

Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks.
IEEE Access, 2017

Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts.
IEEE Access, 2017

Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices.
IEEE Access, 2017

On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems.
IEEE Access, 2017

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications.
IEEE Access, 2017

Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment.
IEEE Access, 2017

2016
An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks.
Wireless Personal Communications, 2016

A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography.
Wireless Personal Communications, 2016

A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
Wireless Personal Communications, 2016

SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms.
IEEE Trans. Consumer Electron., 2016

A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks.
Security and Communication Networks, 2016

Provably secure biometric-based user authentication and key agreement scheme in cloud computing.
Security and Communication Networks, 2016

Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS.
Security and Communication Networks, 2016

Design of sinkhole node detection mechanism for hierarchical wireless sensor networks.
Security and Communication Networks, 2016

Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography.
Security and Communication Networks, 2016

An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks.
Security and Communication Networks, 2016

A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks.
Security and Communication Networks, 2016

Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor.
Security and Communication Networks, 2016

Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks.
Security and Communication Networks, 2016

An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.
Security and Communication Networks, 2016

Provably secure user authentication and key agreement scheme for wireless sensor networks.
Security and Communication Networks, 2016

Provably secure three-factor authentication and key agreement scheme for session initiation protocol.
Security and Communication Networks, 2016

A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card.
Peer Peer Netw. Appl., 2016

A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks.
Peer Peer Netw. Appl., 2016

Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2016

Analysis of Security Protocols for Mobile Healthcare.
J. Medical Syst., 2016

A User Anonymous Mutual Authentication Protocol.
KSII Trans. Internet Inf. Syst., 2016

An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards.
KSII Trans. Internet Inf. Syst., 2016

Design of a secure smart card-based multi-server authentication scheme.
J. Inf. Secur. Appl., 2016

A secure and efficient time-bound hierarchical access control scheme for secure broadcasting.
Int. J. Ad Hoc Ubiquitous Comput., 2016

Lightweight authentication with key-agreement protocol for mobile network environment using smart cards.
IET Information Security, 2016

A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps.
Future Gener. Comput. Syst., 2016

Forbidden substructure for interval digraphs/bigraphs.
Discret. Math., 2016

Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.
Comput. Methods Programs Biomed., 2016

Secure anonymous mutual authentication for star two-tier wireless body area networks.
Comput. Methods Programs Biomed., 2016

An efficient fast algorithm for discovering closed+ high utility itemsets.
Appl. Intell., 2016

A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography.
IEEE Access, 2016

An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Forbidden Subgraphs of Bigraphs of Ferrers Dimension 2.
Proceedings of the Theoretical Computer Science and Discrete Mathematics, 2016

2015
A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks.
Wireless Personal Communications, 2015

An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems.
Wireless Personal Communications, 2015

DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks.
Wireless Personal Communications, 2015

A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks.
Wireless Personal Communications, 2015

A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards.
IEEE Trans. Inf. Forensics Secur., 2015

An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards.
Security and Communication Networks, 2015

A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks.
Security and Communication Networks, 2015

An anonymous and secure biometric-based enterprise digital rights management system for mobile environment.
Security and Communication Networks, 2015

An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks.
Security and Communication Networks, 2015

An effective association rule mining scheme using a new generic basis.
Knowl. Inf. Syst., 2015

A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.
J. Medical Syst., 2015

A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems.
J. Medical Syst., 2015

A Secure and Robust Password-Based Remote User Authentication Scheme Using Smart Cards for the Integrated EPR Information System.
J. Medical Syst., 2015

An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card.
J. Inf. Secur. Appl., 2015

A secure password-based authentication and key agreement scheme using smart cards.
J. Inf. Secur. Appl., 2015

An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks.
Int. J. Commun. Networks Distributed Syst., 2015

A secure and effective access control scheme for distributed wireless sensor networks.
Int. J. Commun. Networks Distributed Syst., 2015

An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices.
IACR Cryptol. ePrint Arch., 2015

An efficient approach for mining association rules from high utility itemsets.
Expert Syst. Appl., 2015

New characterizations of proper interval bigraphs.
AKCE Int. J. Graphs Comb., 2015

A New Biometric-Based Remote User Authentication Scheme in Hierarchical Wireless Body Area Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2015

New Characterizations of Proper Interval Bigraphs and Proper Circular Arc Bigraphs.
Proceedings of the Algorithms and Discrete Applied Mathematics, 2015

2014
An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function.
J. Medical Syst., 2014

A secure effective key management scheme for dynamic access control in a large leaf class hierarchy.
Inf. Sci., 2014

Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks.
Int. J. Trust. Manag. Comput. Commun., 2014

A survey on user access control in wireless sensor networks with formal security verification.
Int. J. Trust. Manag. Comput. Commun., 2014

An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function.
Int. J. Commun. Networks Distributed Syst., 2014

Cryptanalysis on 'Robust Biometrics-Based Authentication Scheme for Multi-server Environment'.
IACR Cryptol. ePrint Arch., 2014

On the Security of 'An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'.
IACR Cryptol. ePrint Arch., 2014

A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards.
Expert Syst. Appl., 2014

An Algorithm for Mining High Utility Closed Itemsets and Generators.
CoRR, 2014

An Enhanced Access Control Scheme in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2014

Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications, 2014

Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications, 2014

2013
A New Key Management Scheme for a User Hierarchy based on a Hybrid Cryptosystem.
Smart CR, 2013

An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System.
J. Medical Syst., 2013

A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care.
J. Medical Syst., 2013

An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System.
J. Medical Syst., 2013

A novel linear polynomial-based dynamic key management scheme for hierarchical access control.
Int. J. Trust. Manag. Comput. Commun., 2013

A Novel Efficient Access Control Scheme for Large-Scale Distributed Wireless Sensor Networks.
Int. J. Found. Comput. Sci., 2013

Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

LHSC: An effective dynamic key management scheme for linear hierarchical access control.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks.
J. Netw. Comput. Appl., 2012

Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem.
Inf. Sci., 2012

Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks.
Int. J. Netw. Secur., 2012

A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks.
Int. J. Inf. Sec., 2012

A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

2011
An efficient random key distribution scheme for large-scale distributed sensor networks.
Security and Communication Networks, 2011

An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks.
JCP, 2011

Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards.
IET Information Security, 2011

A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge
CoRR, 2011

An Unconditionally Secure Key Management Scheme for Large-Scale Heterogeneous Wireless Sensor Networks
CoRR, 2011

An Identity Based Key Management Scheme in Wireless Sensor Networks
CoRR, 2011

An Improved Efficient Key Distribution Mechanism for Large-Scale Heterogeneous Mobile Sensor Networks
CoRR, 2011

Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards
CoRR, 2011

2009
A Location-Adaptive Key Establishment Scheme for Large-Scale Distributed Wireless Sensor Networks.
JCP, 2009

2008
ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks.
Int. J. Netw. Secur., 2008

An Identity-ased Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks.
Int. J. Netw. Secur., 2008

An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

2007
A Key Establishment Scheme for Large-Scale Mobile Wireless Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2007

2005
Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks.
Proceedings of the Distributed Computing, 2005

A Key Reshuffling Scheme for Wireless Sensor Networks.
Proceedings of the Information Systems Security, First International Conference, 2005


  Loading...