Nizamuddin

According to our database1, Nizamuddin authored at least 14 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey.
Comput. Sci. Rev., February, 2023

A typology of secure multicast communication over 5 G/6 G networks.
Int. J. Inf. Sec., 2023

2022
A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments.
J. Inf. Secur. Appl., 2022

2021
Blind signcryption scheme based on hyper elliptic curves cryptosystem.
Peer-to-Peer Netw. Appl., 2021

An Improved Identity-Based Generalized Signcryption Scheme for Secure Multi-Access Edge Computing Empowered Flying Ad Hoc Networks.
IEEE Access, 2021

2020
Cryptanalysis and Improvement of a Proxy Signcryption Scheme in the Standard Computational Model.
IEEE Access, 2020

2019
Substitution Box Design Based on Chaotic Maps and Cuckoo Search Algorithm.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2019

2015
An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography.
Multim. Tools Appl., 2015

An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves.
IACR Cryptol. ePrint Arch., 2015

2013
Preventing black and gray hole attacks in AODV using optimal path routing and hash.
Proceedings of 10th IEEE International Conference on Networking, Sensing and Control, 2013

An efficient and secure mobile phone voting system.
Proceedings of the Eighth International Conference on Digital Information Management (ICDIM 2013), 2013

A hybrid approach for preventing Black and Gray hole attacks in MANET.
Proceedings of the Eighth International Conference on Digital Information Management (ICDIM 2013), 2013

2012
An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem.
Proceedings of 9th IEEE International Conference on Networking, Sensing and Control, 2012

Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem.
Proceedings of the Information Systems, Technology and Management, 2012


  Loading...