Dheerendra Mishra

Orcid: 0000-0001-8115-6397

According to our database1, Dheerendra Mishra authored at least 95 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A module lattice based construction of post quantum secure blockchain architecture.
Trans. Emerg. Telecommun. Technol., April, 2024

A computationally efficient and randomized RLWE-based key exchange scheme.
Clust. Comput., April, 2024

Privacy preserving content distribution framework for multidistributor DRM systems.
Secur. Priv., 2024

2023
Development of quantum-enhanced authenticated key agreement protocol for autonomous vehicles.
Veh. Commun., December, 2023

Quantum-Safe Secure and Authorized Communication Protocol for Internet of Drones.
IEEE Trans. Veh. Technol., December, 2023

Blockchain-Based Partial Group Key Agreement Protocol for Intelligent Transportation Systems.
IEEE Trans. Veh. Technol., December, 2023

Enhancing security of biometrics based authentication framework for DRM system.
Multim. Tools Appl., November, 2023

Comparative Analysis of Handover Authentication Techniques in VANETs.
Wirel. Pers. Commun., October, 2023

Post-quantum secure authenticated key agreement protocol for wireless sensor networks.
Telecommun. Syst., September, 2023

Quantum secure two party authentication protocol for mobile devices.
Peer Peer Netw. Appl., September, 2023

PSMECS: A provably secure ID-based communication in mobile edge computing.
Int. J. Commun. Syst., August, 2023

Construction of system friendly attribute based fully distributed access control architecture for e-healthcare.
Multim. Tools Appl., July, 2023

Quantum-safe three-party lattice based authenticated key agreement protocol for mobile devices.
J. Inf. Secur. Appl., June, 2023

Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing.
Wirel. Pers. Commun., 2023

A privacy oriented authorized key agreement framework for vehicular edge computing.
Secur. Priv., 2023

On the security of ring learning with error-based key exchange protocol against signal leakage attack.
Secur. Priv., 2023

FOESG: anonymous session key agreement protocol for fog assisted smart grid communication.
Int. J. Ad Hoc Ubiquitous Comput., 2023

Cryptanalysis with Countermeasure on the SIS Based Signature Scheme.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023

2022
Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems.
J. Supercomput., 2022

Privacy-Enabling Framework for Cloud-Assisted Digital Healthcare Industry.
IEEE Trans. Ind. Informatics, 2022

PSSCC: Provably secure communication framework for crowdsourced industrial Internet of Things environments.
Softw. Pract. Exp., 2022

Construction of elliptic curve cryptography-based authentication protocol for internet of things.
Secur. Priv., 2022

Blockchain-driven authorized data access mechanism for digital healthcare.
J. Syst. Archit., 2022

On the Security of Content key Distribution Framework for DRM systems.
Proceedings of the International Conference on Communications, 2022

On the security of authenticated key agreement schemes for e-healthcare.
Proceedings of the International Conference on Communications, 2022

2021
Privacy-Preserving Key Agreement Protocol for Fog Computing Supported Internet of Things Environment.
Wirel. Pers. Commun., 2021

Computational Efficient Authenticated Digital Content Distribution Frameworks for DRM Systems: Review and Outlook.
IEEE Syst. J., 2021

Chaos-Based Content Distribution Framework for Digital Rights Management System.
IEEE Syst. J., 2021

SFEEC: Provably Secure Signcryption-Based Big Data Security Framework for Energy-Efficient Computing Environment.
IEEE Syst. J., 2021

Cryptanalysis and improvement of biometric based content distribution framework for digital rights management systems.
Secur. Priv., 2021

Blockchain-based multimedia content distribution with the assured system update mechanism.
Multim. Tools Appl., 2021

An authenticated access control framework for digital right management system.
Multim. Tools Appl., 2021

Construction of a Chaotic Map-Based Authentication Protocol for TMIS.
J. Medical Syst., 2021

A provably secure content distribution framework for portable DRM systems.
J. Inf. Secur. Appl., 2021

A secure and efficient group signature scheme based on multivariate public key cryptography.
J. Inf. Secur. Appl., 2021

Provably secure authenticated content key distribution framework for IoT-enabled enterprise digital rights management systems.
Int. J. Ad Hoc Ubiquitous Comput., 2021

Privacy Preserving Location-based Content Distribution Framework for Digital Rights Management Systems.
Proceedings of the International Conference on Communications, 2021

2020
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing.
Veh. Commun., 2020

Understanding signcryption security in standard model.
Secur. Priv., 2020

Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system.
Multim. Tools Appl., 2020

Efficient and Secure Attribute Based Access Control Architecture for Smart Healthcare.
J. Medical Syst., 2020

Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services - Authorized Access to Healthcare Services.
J. Medical Syst., 2020

A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party.
J. Inf. Secur. Appl., 2020

Post-quantum digital signature scheme based on multivariate cubic problem.
J. Inf. Secur. Appl., 2020

Authenticated content distribution framework for digital rights management systems with smart card revocation.
Int. J. Commun. Syst., 2020

LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication.
Trans. Emerg. Telecommun. Technol., 2020

2019
An Authentication Framework for Roaming Service in Global Mobility Networks.
Inf. Technol. Control., 2019

2018
Privacy Preserving Password-Based Multi-server Authenticated Key Agreement Protocol Using Smart Card.
Wirel. Pers. Commun., 2018

Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks.
Multim. Tools Appl., 2018

Provably secure biometric based authentication and key agreement protocol for wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., 2018

Efficient and secure two-factor dynamic ID-based password authentication scheme with provable security.
Cryptologia, 2018

2017
Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks.
Wirel. Pers. Commun., 2017

A Self-Verifiable Password Based Authentication Scheme for Multi-Server Architecture Using Smart Card.
Wirel. Pers. Commun., 2017

A password based authentication scheme for wireless multimedia systems.
Multim. Tools Appl., 2017

A Mutual Authentication Framework for Wireless Medical Sensor Networks.
J. Medical Syst., 2017

An enhanced dynamic ID-based authentication scheme for telecare medical information systems.
J. King Saud Univ. Comput. Inf. Sci., 2017

A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme.
J. Inf. Secur. Appl., 2017

An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems.
Int. J. Commun. Syst., 2017

Secure and efficient user authentication scheme for multi-gateway wireless sensor networks.
Ad Hoc Networks, 2017

2016
A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2016

Design and Analysis of a Provably Secure Multi-server Authentication Scheme.
Wirel. Pers. Commun., 2016

A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card.
Peer-to-Peer Netw. Appl., 2016

Design of a password-based authenticated key exchange protocol for SIP.
Multim. Tools Appl., 2016

Design of a secure smart card-based multi-server authentication scheme.
J. Inf. Secur. Appl., 2016

Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment.
Proceedings of the Information Systems Security - 12th International Conference, 2016

2015
An anonymous and secure biometric-based enterprise digital rights management system for mobile environment.
Secur. Commun. Networks, 2015

Understanding Security Failures of Two Authentication and Key Agreement Schemes for Telecare Medicine Information Systems.
J. Medical Syst., 2015

On the Security Flaws in ID-based Password Authentication Schemes for Telecare Medical Information Systems.
J. Medical Syst., 2015

A secure password-based authentication and key agreement scheme using smart cards.
J. Inf. Secur. Appl., 2015

Design of a lightweight two-factor authentication scheme with smart card revocation.
J. Inf. Secur. Appl., 2015

An improved biometric-based remote user authentication scheme for connected healthcare.
Int. J. Ad Hoc Ubiquitous Comput., 2015

On the security enhancement of integrated electronic patient records information systems.
Comput. Sci. Inf. Syst., 2015

An Accountable Privacy Architecture for Digital Rights Management System.
Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, 2015

2014
A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014

Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce.
J. Medical Syst., 2014

Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014

A privacy enabling content distribution framework for digital rights management.
Int. J. Trust. Manag. Comput. Commun., 2014

A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards.
Expert Syst. Appl., 2014

Cryptanalysis of Multi-Server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Cards and Biometrics.
CoRR, 2014

Cryptanalysis of Yang et al.'s Digital Rights Management Authentication Scheme Based on Smart Card.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

Cryptanalysis of Two Authentication Scheme for DRM System.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

2013
Cryptanalysis of Wu and Xu's authentication scheme for Telecare Medicine Information Systems.
CoRR, 2013

Cryptanalysis and Improvement of Jiang et al.'s Smart Card Based Remote User Authentication Scheme.
CoRR, 2013

A Study On ID-based Authentication Schemes for Telecare Medical Information System.
CoRR, 2013

Cryptanalysis of Sun and Cao's Remote Authentication Scheme with User Anonymity.
CoRR, 2013

The Cryptanalysis of Lee's Chaotic Maps-Based Authentication and Key Agreement Scheme using Smart card for Telecare Medicine Information Systems.
CoRR, 2013

A Certificateless Authenticated Key Agreement Protocol for Digital Rights Management System.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

A Pairing-Free Identity Based Authentication Framework for Cloud Computing.
Proceedings of the Network and System Security - 7th International Conference, 2013

Secure Content Delivery in DRM System with Consumer Privacy.
Proceedings of the Information Security Practice and Experience, 2013

Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card.
Proceedings of the Information Systems Security - 9th International Conference, 2013

2012
Towards a Secure, Transparent and Privacy-Preserving DRM System.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

Privacy rights management in multiparty multilevel DRM system.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

2011
Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture.
Proceedings of the Security Aspects in Information Technology, 2011

Vector Space Access Structure and ID Based Distributed DRM Key Management.
Proceedings of the Advances in Computing and Communications, 2011


  Loading...