Ruhul Amin

According to our database1, Ruhul Amin authored at least 51 papers between 2013 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A robust mutual authentication scheme for session initiation protocol with key establishment.
Peer-to-Peer Networking and Applications, 2018

Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks.
Multimedia Tools Appl., 2018

A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication.
Multimedia Tools Appl., 2018

An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks.
J. Network and Computer Applications, 2018

Anonymous and expeditious mobile user authentication scheme for GLOMONET environments.
Int. J. Communication Systems, 2018

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment.
Future Generation Comp. Syst., 2018

A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment.
Future Generation Comp. Syst., 2018

A robust and anonymous patient monitoring system using wireless medical sensor networks.
Future Generation Comp. Syst., 2018

A robust mutual authentication protocol for WSN with multiple base-stations.
Ad Hoc Networks, 2018

2017
Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks.
Wireless Personal Communications, 2017

Preventing from Cross-VM Side-Channel Attack Using New Replacement Method.
Wireless Personal Communications, 2017

Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card.
Wireless Personal Communications, 2017

Design of authentication protocol for wireless sensor network-based smart vehicular system.
Vehicular Communications, 2017

A software agent enabled biometric security algorithm for secure file access in consumer storage devices.
IEEE Trans. Consumer Electronics, 2017

The Modular Optical Underwater Survey System.
Sensors, 2017

A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments.
Security and Communication Networks, 2017

A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
J. Medical Systems, 2017

An enhanced bilinear pairing based authenticated key agreement protocol for multiserver environment.
Int. J. Communication Systems, 2017

A robust ElGamal-based password-authentication protocol using smart card for client-server communication.
Int. J. Communication Systems, 2017

An anonymous and robust multi-server authentication protocol using multiple registration servers.
Int. J. Communication Systems, 2017

Trees with minimum F-coindex.
Electronic Notes in Discrete Mathematics, 2017

A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity.
Computers & Electrical Engineering, 2017

2016
Security analysis and design of an efficient ECC-based two-factor password authentication scheme.
Security and Communication Networks, 2016

An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design.
Security and Communication Networks, 2016

A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.
Security and Communication Networks, 2016

A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.
J. Medical Systems, 2016

An Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card.
I. J. Network Security, 2016

Cryptanalysis and Efficient Dynamic ID Based Remote User Authentication Scheme in Multi-server Environment Using Smart Card.
I. J. Network Security, 2016

An anonymous and provably secure authentication scheme for mobile user.
Int. J. Communication Systems, 2016

Ordering Unicyclic Graphs with Respect to F-index.
CoRR, 2016

On the F-index and F-coindex of the line graphs of the subdivision graphs.
CoRR, 2016

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks.
Computer Networks, 2016

A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks.
Ad Hoc Networks, 2016

Bangladeshi dialect recognition using Mel Frequency Cepstral Coefficient, Delta, Delta-delta and Gaussian Mixture Model.
Proceedings of the Eighth International Conference on Advanced Computational Intelligence, 2016

2015
Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment.
Wireless Personal Communications, 2015

Efficient biometric and password based mutual authentication for consumer USB mass storage devices.
IEEE Trans. Consumer Electronics, 2015

Comparative Analysis of GOCI Ocean Color Products.
Sensors, 2015

Inter-Comparison between VIIRS and MODIS Radiances and Ocean Color Data Products over the Chesapeake Bay.
Remote Sensing, 2015

Occurrence and Spatial Extent of HABs on the West Florida Shelf 2002-Present.
IEEE Geosci. Remote Sensing Lett., 2015

An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems.
J. Medical Systems, 2015

Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
J. Medical Systems, 2015

Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.
J. Medical Systems, 2015

An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Systems, 2015

An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.
J. Medical Systems, 2015

A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.
J. Medical Systems, 2015

A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS.
J. Medical Systems, 2015

Cryptanalysis of a Markov Chain Based User Authentication Scheme.
IACR Cryptology ePrint Archive, 2015

Secure Remote Login Scheme with Password and Smart Card Update Facilities.
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2015

An efficient remote mutual authentication scheme using smart mobile phone over insecure networks.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

2014
Assessing the Application of Cloud-Shadow Atmospheric Correction Algorithm on HICO.
IEEE Trans. Geoscience and Remote Sensing, 2014

2013
Optical Algorithm for Cloud Shadow Detection Over Water.
IEEE Trans. Geoscience and Remote Sensing, 2013


  Loading...