SK Hafizul Islam

According to our database1, SK Hafizul Islam authored at least 103 papers between 2011 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Provably Secure and Lightweight Identity-Based Authenticated Data Sharing Protocol for Cyber-Physical Cloud Environment.
IEEE Trans. Cloud Comput., 2021

Improved ECC-Based Three-Factor Multiserver Authentication Scheme.
Secur. Commun. Networks, 2021

A Trusted Consensus Scheme for Collaborative Learning in the Edge AI Computing Domain.
IEEE Netw., 2021

A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance.
J. Syst. Archit., 2021

Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security.
J. Inf. Secur. Appl., 2021

Provably secure biometric-based client-server secure communication over unreliable networks.
J. Inf. Secur. Appl., 2021

A comprehensive review on collision-resistant hash functions on lattices.
J. Inf. Secur. Appl., 2021

Secure content-based image retrieval using modified Euclidean distance for encrypted features.
Trans. Emerg. Telecommun. Technol., 2021

A Reinforced Dynamic Multi-keyword Ranked Search with Forward Privacy.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
A heterogeneous user authentication and key establishment for mobile client-server environment.
Wirel. Networks, 2020

Efficient and Secure Anonymous Authentication With Location Privacy for IoT-Based WBANs.
IEEE Trans. Ind. Informatics, 2020

Intelligent Secure Ecosystem Based on Metaheuristic and Functional Link Neural Network for Edge of Things.
IEEE Trans. Ind. Informatics, 2020

A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices.
IEEE Trans. Consumer Electron., 2020

Model based IoT security framework using multiclass adaptive boosting with SMOTE.
Secur. Priv., 2020

Lung cancer prediction using higher-order recurrent neural network based on glowworm swarm optimization.
Neural Comput. Appl., 2020

Provably secure identity-based two-party authenticated key agreement protocol based on CBi-ISIS and Bi-ISIS problems on lattices.
J. Inf. Secur. Appl., 2020

Provably secure two-party authenticated key agreement protocol for post-quantum environments.
J. Inf. Secur. Appl., 2020

A robust authentication and access control protocol for securing wireless healthcare sensor networks.
J. Inf. Secur. Appl., 2020

An enhanced and provably secure multi-factor authentication scheme for Internet-of-Multimedia-Things environments.
Comput. Electr. Eng., 2020

IEEE Access Special Section Editorial: Security and Privacy for Cloud and IoT.
IEEE Access, 2020

An Improved Authentication Scheme for Remote Data Access and Sharing Over Cloud Storage in Cyber-Physical-Social-Systems.
IEEE Access, 2020

A Secure Authentication Mechanism for Wireless Sensor Networks.
Proceedings of the International Conference on Computer, 2020

A Post Dynamic Clustering Approach for Classification-based Image Retrieval.
Proceedings of the International Conference on Communications, 2020

2019
Secure CLS and CL-AS schemes designed for VANETs.
J. Supercomput., 2019

Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System.
IEEE J. Biomed. Health Informatics, 2019

Security analysis on "mutual authentication scheme for multimedia medical information systems".
Secur. Priv., 2019

Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs.
Inf. Sci., 2019

A lightweight machine learning-based authentication framework for smart IoT devices.
Inf. Sci., 2019

MGPV: A novel and efficient scheme for secure data sharing among mobile users in the public cloud.
Future Gener. Comput. Syst., 2019

A novel machine learning based feature selection for motor imagery EEG signal classification in Internet of medical things environment.
Future Gener. Comput. Syst., 2019

A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs.
Comput. Networks, 2019

An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system.
Comput. Methods Programs Biomed., 2019

Applying an ensemble convolutional neural network with Savitzky-Golay filter to construct a phonocardiogram prediction model.
Appl. Soft Comput., 2019

A Secure Identity-based Deniable Authentication Protocol for MANETs.
Proceedings of the 2019 International Conference on Computer, 2019

2018
Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments.
IEEE Trans. Ind. Informatics, 2018

A comparative study and analysis of some pseudorandom number generator algorithms.
Secur. Priv., 2018

Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks.
Multim. Tools Appl., 2018

A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multim. Tools Appl., 2018

A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication.
Multim. Tools Appl., 2018

An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks.
J. Netw. Comput. Appl., 2018

A pairing-free and provably secure certificateless signature scheme.
Inf. Sci., 2018

Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments.
IEEE Internet Things J., 2018

A Provably Secure Three-Factor Session Initiation Protocol for Multimedia Big Data Communications.
IEEE Internet Things J., 2018

Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES.
Int. J. Commun. Syst., 2018

Anonymous and expeditious mobile user authentication scheme for GLOMONET environments.
Int. J. Commun. Syst., 2018

A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor.
Int. J. Ad Hoc Ubiquitous Comput., 2018

A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs.
Future Gener. Comput. Syst., 2018

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment.
Future Gener. Comput. Syst., 2018

An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment.
Future Gener. Comput. Syst., 2018

A robust and anonymous patient monitoring system using wireless medical sensor networks.
Future Gener. Comput. Syst., 2018

A robust mutual authentication protocol for WSN with multiple base-stations.
Ad Hoc Networks, 2018

ES3B: Enhanced Security System for Smart Building Using IoT.
Proceedings of the 2018 IEEE International Conference on Smart Cloud, 2018

2017
Secure Data Access and Sharing Scheme for Cloud Storage.
Wirel. Pers. Commun., 2017

A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks.
Wirel. Pers. Commun., 2017

A software agent enabled biometric security algorithm for secure file access in consumer storage devices.
IEEE Trans. Consumer Electron., 2017

A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments.
Secur. Commun. Networks, 2017

A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication.
J. King Saud Univ. Comput. Inf. Sci., 2017

An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments.
J. King Saud Univ. Comput. Inf. Sci., 2017

Security Vulnerabilities and Improvements of SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks.
Inf. Technol. Control., 2017

A robust ElGamal-based password-authentication protocol using smart card for client-server communication.
Int. J. Commun. Syst., 2017

An anonymous and robust multi-server authentication protocol using multiple registration servers.
Int. J. Commun. Syst., 2017

A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2017

Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme.
Proceedings of the Mathematics and Computing - Third International Conference, 2017

2016
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
Wirel. Pers. Commun., 2016

An effective key distribution for secure internet pay-TV using access key hierarchies.
Secur. Commun. Networks, 2016

An efficient group key agreement protocol for secure P2P communication.
Secur. Commun. Networks, 2016

Security analysis and design of an efficient ECC-based two-factor password authentication scheme.
Secur. Commun. Networks, 2016

An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design.
Secur. Commun. Networks, 2016

Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor.
Secur. Commun. Networks, 2016

A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.
Secur. Commun. Networks, 2016

An anonymous and provably secure authentication scheme for mobile user.
Int. J. Commun. Syst., 2016

Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks.
Int. J. Commun. Syst., 2016

Design and analysis of an improved smartcard-based remote user password authentication scheme.
Int. J. Commun. Syst., 2016

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks.
Comput. Networks, 2016

Design of an enhanced authentication protocol and its verification using AVISPA.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

2015
Provably secure one-round certificateless authenticated group key agreement protocol for secure communications.
Wirel. Pers. Commun., 2015

Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps.
Wirel. Pers. Commun., 2015

Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys.
Wirel. Pers. Commun., 2015

Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing.
Secur. Commun. Networks, 2015

Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing.
Secur. Commun. Networks, 2015

Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
J. Medical Syst., 2015

Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.
J. Medical Syst., 2015

An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Syst., 2015

Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system.
J. King Saud Univ. Comput. Inf. Sci., 2015

Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps.
Inf. Sci., 2015

A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks.
Concurr. Comput. Pract. Exp., 2015

Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings.
Comput. J., 2015

An efficient remote mutual authentication scheme using smart mobile phone over insecure networks.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

2014
A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL Attack.
Wirel. Pers. Commun., 2014

Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems.
J. Medical Syst., 2014

Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings.
J. King Saud Univ. Comput. Inf. Sci., 2014

A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings.
J. King Saud Univ. Comput. Inf. Sci., 2014

Design of identity-based digital signature schemes using extended chaotic maps.
IACR Cryptol. ePrint Arch., 2014

Identity-based encryption and digital signature schemes using extended chaotic maps.
IACR Cryptol. ePrint Arch., 2014

Design of ECC-Based ElGamal Encryption Scheme Using CL-PKC.
Proceedings of the Recent Advances in Information Technology, 2014

2013
Design of improved password authentication and update scheme based on elliptic curve cryptography.
Math. Comput. Model., 2013

Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings.
J. King Saud Univ. Comput. Inf. Sci., 2013

Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2013

2012
A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks.
Ann. des Télécommunications, 2012

Design of an efficient ID-based short designated verifier proxy signature scheme.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

Certificateless strong designated verifier multisignature scheme using bilinear pairings.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

2011
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem.
J. Syst. Softw., 2011

Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment.
Proceedings of the Advances in Computing and Communications, 2011


  Loading...