Mohammad Wazid

According to our database1, Mohammad Wazid authored at least 38 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions.
Pervasive and Mobile Computing, 2019

Authentication in cloud-driven IoT-based big data environment: Survey and outlook.
Journal of Systems Architecture - Embedded Systems Design, 2019

Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment.
IEEE Internet of Things Journal, 2019

Design of secure key management and user authentication scheme for fog computing services.
Future Generation Comp. Syst., 2019

Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions.
IEEE Consumer Electronics Magazine, 2019

Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment.
IEEE Access, 2019

2018
Provably Secure Authenticated Key Agreement Scheme for Smart Grid.
IEEE Trans. Smart Grid, 2018

A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.
IEEE J. Biomedical and Health Informatics, 2018

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
IEEE J. Biomedical and Health Informatics, 2018

A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks.
Telecommunication Systems, 2018

Authenticated key management protocol for cloud-assisted body area sensor networks.
J. Network and Computer Applications, 2018

Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks.
IEEE Internet of Things Journal, 2018

Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment.
IEEE Internet of Things Journal, 2018

Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions.
IEEE Consumer Electronics Magazine, 2018

2017
A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks.
Wireless Personal Communications, 2017

Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment.
IEEE Trans. Industrial Informatics, 2017

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Network and Computer Applications, 2017

Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment.
IEEE Internet of Things Journal, 2017

Provably secure authenticated key agreement scheme for distributed mobile cloud computing services.
Future Generation Comp. Syst., 2017

On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2017

Lightweight authentication protocols for wearable devices.
Computers & Electrical Engineering, 2017

Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks.
IEEE Access, 2017

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications.
IEEE Access, 2017

2016
An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks.
Wireless Personal Communications, 2016

A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography.
Wireless Personal Communications, 2016

Provably secure biometric-based user authentication and key agreement scheme in cloud computing.
Security and Communication Networks, 2016

Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS.
Security and Communication Networks, 2016

Design of sinkhole node detection mechanism for hierarchical wireless sensor networks.
Security and Communication Networks, 2016

An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.
Security and Communication Networks, 2016

Analysis of Security Protocols for Mobile Healthcare.
J. Medical Systems, 2016

Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.
Computer Methods and Programs in Biomedicine, 2016

Secure anonymous mutual authentication for star two-tier wireless body area networks.
Computer Methods and Programs in Biomedicine, 2016

2015
Forensics of Random-UDP Flooding Attacks.
JNW, 2015

2014
Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks.
IACR Cryptology ePrint Archive, 2014

2013
Implementation and Embellishment of Prevention of Keylogger Spyware Attacks.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

Big data: Issues, challenges, tools and Good practices.
Proceedings of the Sixth International Conference on Contemporary Computing, 2013

2012
Efficient Protocol Prediction Algorithm for MANET Multimedia Transmission Under JF Periodic Dropping Attack.
Proceedings of the Second International Conference on Soft Computing for Problem Solving, 2012

Performance of a LAN under different ethernet wiring standards.
Proceedings of the CUBE International IT Conference & Exhibition, 2012


  Loading...