Uddeshaya Kumar

Orcid: 0000-0001-8041-3697

According to our database1, Uddeshaya Kumar authored at least 13 papers between 2021 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
Anonymous Two-Party Authentication and Key Establishment With Trusted Server for Future-Proofing Security of Mobile Communication System.
IEEE Open J. Commun. Soc., 2026

2025
Design and analysis of a post-quantum secure three party authenticated key agreement protocol based on ring learning with error for mobile device.
J. Supercomput., January, 2025

2024
Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication.
Clust. Comput., July, 2024

Anonymous Quantum Safe Construction of Three Party Authentication and Key Agreement Protocol for Mobile Devices.
IEEE Access, 2024

2023
A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication.
Trans. Emerg. Telecommun. Technol., January, 2023

A Construction of Three Party Post Quantum Secure Authenticated Key Exchange Using Ring Learning With Errors and ECC Cryptography.
IEEE Access, 2023

A Construction of Three Party Post Quantum Secure Authenticated Key Exchange for Mobile Users.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

2022
A note on an enhanced dynamic authentication scheme for mobile satellite communication systems.
Int. J. Satell. Commun. Netw., 2022

CCAKESC: Chaotic map-based construction of a new authenticated key exchange protocol for satellite communication.
Int. J. Satell. Commun. Netw., 2022

Learning with error-based key agreement and authentication scheme for satellite communication.
Int. J. Satell. Commun. Netw., 2022

Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for IoT applications.
Trans. Emerg. Telecommun. Technol., 2022

2021
Edge based authentication protocol for vehicular communications without trusted party communication.
J. Syst. Archit., 2021

Post quantum secure conditional privacy preserving authentication for edge based vehicular communication.
Trans. Emerg. Telecommun. Technol., 2021


  Loading...