SK Hafizul Islam

According to our database1, SK Hafizul Islam authored at least 57 papers between 2011 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments.
IEEE Trans. Industrial Informatics, 2018

Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks.
Multimedia Tools Appl., 2018

A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multimedia Tools Appl., 2018

A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication.
Multimedia Tools Appl., 2018

An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks.
J. Network and Computer Applications, 2018

A pairing-free and provably secure certificateless signature scheme.
Inf. Sci., 2018

Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments.
IEEE Internet of Things Journal, 2018

Anonymous and expeditious mobile user authentication scheme for GLOMONET environments.
Int. J. Communication Systems, 2018

A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor.
IJAHUC, 2018

A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs.
Future Generation Comp. Syst., 2018

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment.
Future Generation Comp. Syst., 2018

An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment.
Future Generation Comp. Syst., 2018

A robust and anonymous patient monitoring system using wireless medical sensor networks.
Future Generation Comp. Syst., 2018

A robust mutual authentication protocol for WSN with multiple base-stations.
Ad Hoc Networks, 2018

2017
Secure Data Access and Sharing Scheme for Cloud Storage.
Wireless Personal Communications, 2017

A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks.
Wireless Personal Communications, 2017

A software agent enabled biometric security algorithm for secure file access in consumer storage devices.
IEEE Trans. Consumer Electronics, 2017

A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments.
Security and Communication Networks, 2017

Security Vulnerabilities and Improvements of SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks.
ITC, 2017

A robust ElGamal-based password-authentication protocol using smart card for client-server communication.
Int. J. Communication Systems, 2017

An anonymous and robust multi-server authentication protocol using multiple registration servers.
Int. J. Communication Systems, 2017

A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2017

2016
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
Wireless Personal Communications, 2016

An effective key distribution for secure internet pay-TV using access key hierarchies.
Security and Communication Networks, 2016

An efficient group key agreement protocol for secure P2P communication.
Security and Communication Networks, 2016

Security analysis and design of an efficient ECC-based two-factor password authentication scheme.
Security and Communication Networks, 2016

An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design.
Security and Communication Networks, 2016

Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor.
Security and Communication Networks, 2016

A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.
Security and Communication Networks, 2016

An anonymous and provably secure authentication scheme for mobile user.
Int. J. Communication Systems, 2016

Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks.
Int. J. Communication Systems, 2016

Design and analysis of an improved smartcard-based remote user password authentication scheme.
Int. J. Communication Systems, 2016

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks.
Computer Networks, 2016

2015
Provably secure one-round certificateless authenticated group key agreement protocol for secure communications.
Wireless Personal Communications, 2015

Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps.
Wireless Personal Communications, 2015

Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys.
Wireless Personal Communications, 2015

Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing.
Security and Communication Networks, 2015

Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing.
Security and Communication Networks, 2015

Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
J. Medical Systems, 2015

Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.
J. Medical Systems, 2015

An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Systems, 2015

Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps.
Inf. Sci., 2015

A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks.
Concurrency and Computation: Practice and Experience, 2015

Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings.
Comput. J., 2015

An efficient remote mutual authentication scheme using smart mobile phone over insecure networks.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

2014
A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL Attack.
Wireless Personal Communications, 2014

Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems.
J. Medical Systems, 2014

Design of identity-based digital signature schemes using extended chaotic maps.
IACR Cryptology ePrint Archive, 2014

Identity-based encryption and digital signature schemes using extended chaotic maps.
IACR Cryptology ePrint Archive, 2014

Design of ECC-Based ElGamal Encryption Scheme Using CL-PKC.
Proceedings of the Recent Advances in Information Technology, 2014

2013
Design of improved password authentication and update scheme based on elliptic curve cryptography.
Mathematical and Computer Modelling, 2013

Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2013

2012
A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks.
Annales des Télécommunications, 2012

Design of an efficient ID-based short designated verifier proxy signature scheme.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

Certificateless strong designated verifier multisignature scheme using bilinear pairings.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

2011
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem.
Journal of Systems and Software, 2011

Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment.
Proceedings of the Advances in Computing and Communications, 2011


  Loading...