Shehzad Ashraf Chaudhry

According to our database1, Shehzad Ashraf Chaudhry authored at least 47 papers between 2010 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data.
The Journal of Supercomputing, 2018

An efficient and secure design of multi-server authenticated key agreement protocol.
The Journal of Supercomputing, 2018

An improved and robust biometrics-based three factor authentication scheme for multiserver environments.
The Journal of Supercomputing, 2018

An improved and secure chaotic map based authenticated key agreement in multi-server architecture.
Multimedia Tools Appl., 2018

A secure mutual authenticated key agreement of user with multiple servers for critical systems.
Multimedia Tools Appl., 2018

An enhanced lightweight anonymous biometric based authentication scheme for TMIS.
Multimedia Tools Appl., 2018

Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
TIIS, 2018

Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee's Scheme.
ITC, 2018

Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure.
Future Generation Comp. Syst., 2018

An elliptic curve cryptography based lightweight authentication scheme for smart grid communication.
Future Generation Comp. Syst., 2018

2017
An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification.
Wireless Personal Communications, 2017

An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography.
Wireless Personal Communications, 2017

A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks.
Wireless Personal Communications, 2017

Comments on "A privacy preserving three-factor authentication protocol for e-health clouds".
The Journal of Supercomputing, 2017

An improved smart card based authentication scheme for session initiation protocol.
Peer-to-Peer Networking and Applications, 2017

An improved and provably secure privacy preserving authentication protocol for SIP.
Peer-to-Peer Networking and Applications, 2017

A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme.
Multimedia Tools Appl., 2017

An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems.
Multimedia Tools Appl., 2017

Security Vulnerabilities and Improvements of SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks.
ITC, 2017

A robust ElGamal-based password-authentication protocol using smart card for client-server communication.
Int. J. Communication Systems, 2017

An improved lightweight multiserver authentication scheme.
Int. J. Communication Systems, 2017

A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security.
Int. J. Communication Systems, 2017

A privacy preserving authentication scheme for roaming in ubiquitous networks.
Cluster Computing, 2017

Efficient end-to-end authentication protocol for wearable health monitoring systems.
Computers & Electrical Engineering, 2017

Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management".
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

2016
An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client-Client Networks.
Wireless Personal Communications, 2016

An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre.
The Journal of Supercomputing, 2016

A provably secure anonymous authentication scheme for Session Initiation Protocol.
Security and Communication Networks, 2016

A secure biometric based multi-server authentication scheme for social multimedia networks.
Multimedia Tools Appl., 2016

A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.
J. Medical Systems, 2016

A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Systems, 2016

An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services.
TIIS, 2016

An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture.
TIIS, 2016

A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography.
Electronic Commerce Research, 2016

A lightweight message authentication scheme for Smart Grid communications in power sector.
Computers & Electrical Engineering, 2016

2015
An enhanced privacy preserving remote user authentication scheme with provable security.
Security and Communication Networks, 2015

A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card.
Multimedia Tools Appl., 2015

An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography.
Multimedia Tools Appl., 2015

Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems.
J. Medical Systems, 2015

An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.
J. Medical Systems, 2015

An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks.
ITC, 2015

Comment on 'Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications'.
IET Communications, 2015

A Secure Authentication Scheme for Session Initiation Protocol Based on Elliptic Curve Cryptography.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme.
Security and Communication Networks, 2014

2012
An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem.
Proceedings of 9th IEEE International Conference on Networking, Sensing and Control, 2012

Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem.
Proceedings of the Information Systems, Technology and Management, 2012

2010
Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010


  Loading...