Vanga Odelu

According to our database1, Vanga Odelu authored at least 49 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment.
J. Ambient Intelligence and Humanized Computing, 2019

An Efficient Two-Server Password-only User Authentication for Consumer Electronic Devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

2018
Provably Secure Authenticated Key Agreement Scheme for Smart Grid.
IEEE Trans. Smart Grid, 2018

Attribute-based authentication on the cloud for thin clients.
The Journal of Supercomputing, 2018

A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks.
Telecommunication Systems, 2018

Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks.
IEEE Internet of Things Journal, 2018

Enhanced Session Initiation Protocols for Emergency Healthcare Applications.
CoRR, 2018

An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks.
Computers & Electrical Engineering, 2018

Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks.
IEEE Access, 2018

Expert Intelligence: Theory of the Missing Facet.
Proceedings of the Mining Intelligence and Knowledge Exploration, 2018

2017
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2017

A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks.
Wireless Personal Communications, 2017

Provably secure authenticated key agreement scheme for distributed mobile cloud computing services.
Future Generation Comp. Syst., 2017

Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment.
Computer Standards & Interfaces, 2017

Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks.
IEEE Access, 2017

Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts.
IEEE Access, 2017

Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices.
IEEE Access, 2017

Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment.
IEEE Access, 2017

2016
SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms.
IEEE Trans. Consumer Electronics, 2016

Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography.
Security and Communication Networks, 2016

An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks.
Security and Communication Networks, 2016

Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks.
Security and Communication Networks, 2016

An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.
Security and Communication Networks, 2016

Provably secure user authentication and key agreement scheme for wireless sensor networks.
Security and Communication Networks, 2016

Provably secure three-factor authentication and key agreement scheme for session initiation protocol.
Security and Communication Networks, 2016

Analysis of Security Protocols for Mobile Healthcare.
J. Medical Systems, 2016

A User Anonymous Mutual Authentication Protocol.
TIIS, 2016

A secure and efficient time-bound hierarchical access control scheme for secure broadcasting.
IJAHUC, 2016

Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.
Computer Methods and Programs in Biomedicine, 2016

Secure anonymous mutual authentication for star two-tier wireless body area networks.
Computer Methods and Programs in Biomedicine, 2016

2015
A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks.
Wireless Personal Communications, 2015

An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems.
Wireless Personal Communications, 2015

DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks.
Wireless Personal Communications, 2015

A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards.
IEEE Trans. Information Forensics and Security, 2015

An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards.
Security and Communication Networks, 2015

A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks.
Security and Communication Networks, 2015

A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.
J. Medical Systems, 2015

An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card.
J. Inf. Sec. Appl., 2015

An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices.
IACR Cryptology ePrint Archive, 2015

2014
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy.
Inf. Sci., 2014

An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function.
IJCNDS, 2014

Cryptanalysis on 'Robust Biometrics-Based Authentication Scheme for Multi-server Environment'.
IACR Cryptology ePrint Archive, 2014

Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications, 2014

2013
A New Key Management Scheme for a User Hierarchy based on a Hybrid Cryptosystem.
Smart CR, 2013

An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System.
J. Medical Systems, 2013

A novel linear polynomial-based dynamic key management scheme for hierarchical access control.
IJTMCC, 2013

Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

LHSC: An effective dynamic key management scheme for linear hierarchical access control.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

2012
A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012


  Loading...