default search action
Saru Kumari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j280]Amna Kosar, Muhammad Asif, Maaz Bin Ahmad, Waseem Akram, Khalid Mahmood, Saru Kumari:
Towards classification and comprehensive analysis of AI-based COVID-19 diagnostic techniques: A survey. Artif. Intell. Medicine 151: 102858 (2024) - [j279]Erqiang Deng, Li You, Fazlullah Khan, Guosong Zhu, Zhen Qin, Saru Kumari, Hu Xiong, Ryan Alturki:
Decoding the third dimension in the metaverse: A comprehensive method for reconstructing 2D NFT portraits into 3D models. Appl. Soft Comput. 165: 111964 (2024) - [j278]Rashad Elhabob, Mazin Taha, Hu Xiong, Muhammad Khurram Khan, Saru Kumari, Pradeep Chaudhary:
Pairing-free certificateless public key encryption with equality test for Internet of Vehicles. Comput. Electr. Eng. 116: 109140 (2024) - [j277]Abdalla Hadabi, Zheng Qu, Rashad Elhabob, Sachin Kumar, Kuo-Hui Yeh, Saru Kumari, Hu Xiong:
Proxy re-encryption with plaintext checkable encryption for integrating digital twins into IIoT. Comput. Electr. Eng. 116: 109164 (2024) - [j276]Abdalla Hadabi, Zheng Qu, Mohammed Amoon, Chien-Ming Chen, Saru Kumari, Hu Xiong:
Secure personal-health-records searching in edge-based Internet of Medical Things through plaintext checkable encryption. Comput. Electr. Eng. 118: 109373 (2024) - [j275]Yu-Chi Chen, Song-Yi Hsu, Xin Xie, Saru Kumari, Sachin Kumar, Joel J. P. C. Rodrigues, Bander A. Alzahrani:
Privacy preserving support vector machine based on federated learning for distributed IoT-enabled data analysis. Comput. Intell. 40(2) (2024) - [j274]Dharminder Chaudhary, M. S. P. Durgarao, Dheerendra Mishra, Saru Kumari:
A module lattice based construction of post quantum secure blockchain architecture. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j273]Sathish Kumar, Velliangiri Sarveshwaran, Periyasami Karthikeyan, Saru Kumari, Sachin Kumar, Muhammad Khurram Khan:
A survey on the blockchain techniques for the Internet of Vehicles security. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j272]Abdalla Hadabi, Zheng Qu, Rashad Elhabob, Sachin Kumar, Saru Kumari, Hu Xiong:
Efficient plaintext checkable identity-based signcryption in cyber-physical systems towards IIoT. Trans. Emerg. Telecommun. Technol. 35(6) (2024) - [j271]Kan Wang, Peng Yuan, Mian Ahmad Jan, Fazlullah Khan, Thippa Reddy Gadekallu, Saru Kumari, Hao Pan, Lei Liu:
Digital twin-assisted service function chaining in multi-domain computing power networks with multi-agent reinforcement learning. Future Gener. Comput. Syst. 158: 294-307 (2024) - [j270]Giuseppe Varone, Wadii Boulila, Maha Driss, Saru Kumari, Muhammad Khurram Khan, Thippa Reddy Gadekallu, Amir Hussain:
Finger pinching and imagination classification: A fusion of CNN architectures for IoMT-enabled BCI applications. Inf. Fusion 101: 102006 (2024) - [j269]Guosong Zhu, Erqiang Deng, Zhen Qin, Fazlullah Khan, Wei Wei, Gautam Srivastava, Hu Xiong, Saru Kumari:
Cross-modal interaction and multi-source visual fusion for video generation in fetal cardiac screening. Inf. Fusion 111: 102510 (2024) - [j268]Ruikang Yang, Jianfeng Ma, Junying Zhang, Saru Kumari, Sachin Kumar, Joel J. P. C. Rodrigues:
Practical Feature Inference Attack in Vertical Federated Learning During Prediction in Artificial Internet of Things. IEEE Internet Things J. 11(1): 5-16 (2024) - [j267]Morteza Adeli, Nasour Bagheri, Hamid Reza Maimani, Saru Kumari, Joel J. P. C. Rodrigues:
A Post-Quantum Compliant Authentication Scheme for IoT Healthcare Systems. IEEE Internet Things J. 11(4): 6111-6118 (2024) - [j266]Chien-Ming Chen, Qingkai Miao, Saru Kumari, Muhammad Khurram Khan, Joel J. P. C. Rodrigues:
A Privacy-Preserving Authentication Protocol for Electric Vehicle Battery Swapping Based on Intelligent Blockchain. IEEE Internet Things J. 11(10): 17538-17551 (2024) - [j265]Shan Zhou, Xianting Huang, Mohammad S. Obaidat, Bander A. Alzahrani, Xuming Han, Saru Kumari, Chien-Ming Chen:
Transferability of Adversarial Attacks on Tiny Deep Learning Models for IoT Unmanned Aerial Vehicles. IEEE Internet Things J. 11(12): 21037-21045 (2024) - [j264]Xuesong Bai, Peng Dong, Yuanhao Huang, Saru Kumari, Haiyang Yu, Yilong Ren:
An AR-Based Meta Vehicle Road Cooperation Testing Systems: Framework, Components Modeling, and an Implementation Example. IEEE Internet Things J. 11(13): 23460-23474 (2024) - [j263]Chien-Ming Chen, Zhaoting Chen, Saru Kumari, Mohammad S. Obaidat, Joel J. P. C. Rodrigues, Muhammad Khurram Khan:
Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment. IEEE Internet Things J. 11(14): 25394-25412 (2024) - [j262]Fei Zhu, Duan Guo, Sharif Abuadbba, Xun Yi, Junwei Luo, Saru Kumari, Tao Peng:
Lightweight Verifiable Privacy-Preserving Data Aggregation for Smart Grids. IEEE Internet Things J. 11(19): 31249-31259 (2024) - [j261]Vivek Dabra, Saru Kumari, Anju Bala, Sonam Yadav:
SL3PAKE: Simple Lattice-based Three-party Password Authenticated Key Exchange for post-quantum world. J. Inf. Secur. Appl. 84: 103826 (2024) - [j260]Rifaqat Ali, Arup Kumar Pal, Saru Kumari, Arun Kumar Sangaiah, Xiong Li, Fan Wu:
An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring. J. Ambient Intell. Humaniz. Comput. 15(1): 1165-1186 (2024) - [j259]Jingxue Chen, Zengxiang Wang, Gautam Srivastava, Turki Ali Alghamdi, Fazlullah Khan, Saru Kumari, Hu Xiong:
Industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training. J. Ind. Inf. Integr. 39: 100593 (2024) - [j258]Mubeen Javed, Muhammad Arslan Akram, Adnan Noor Mian, Saru Kumari:
On the security of a novel privacy-preserving authentication scheme for V2G networks. Secur. Priv. 7(2) (2024) - [j257]Sachin Kumar, Akshit Tyagi, Kadambri Agarwal, Saru Kumari, Chien-Ming Chen:
A trustworthy data collection approach from sensor nodes using trust score of mobile vehicles for smart city. Secur. Priv. 7(4) (2024) - [j256]Sonam Yadav, Vivek Dabra, Pradeep Malik, Saru Kumari:
Flaw and amendment of Dharminder et al.'s authentication protocol for satellite communication. Secur. Priv. 7(4) (2024) - [j255]Chien-Ming Chen, Qingkai Miao, Fazlullah Khan, Gautam Srivastava, Saru Kumari:
Sustainable Secure Communication in Consumer-Centric Electric Vehicle Charging in Industry 5.0 Environments. IEEE Trans. Consumer Electron. 70(1): 1544-1555 (2024) - [j254]Zheng Qu, Saru Kumari, Mohammad S. Obaidat, Bander A. Alzahrani, Hu Xiong:
Traceable Attribute-Based Encryption With Equality Test for Cloud Enabled E-Health System. IEEE J. Biomed. Health Informatics 28(9): 5033-5042 (2024) - [j253]Md Ismail, Santanu Chatterjee, Jamuna Kanta Sing, Saru Kumari, Joel J. P. C. Rodrigues:
Designing Anonymous Key Agreement Scheme for Secure Vehicular Ad-Hoc Networks. IEEE Trans. Intell. Transp. Syst. 25(9): 11382-11396 (2024) - [j252]Samad Rostampour, Nasour Bagheri, Behnam Ghavami, Ygal Bendavid, Saru Kumari, Honorio Martín, Carmen Camara:
Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures. J. Supercomput. 80(2): 1668-1693 (2024) - [j251]Samad Rostampour, Nasour Bagheri, Behnam Ghavami, Ygal Bendavid, Saru Kumari, Honorio Martín, Carmen Camara:
Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures. J. Supercomput. 80(2): 2914-2915 (2024) - [j250]Sumbal Fatima, Muhammad Arslan Akram, Adnan Noor Mian, Saru Kumari, Chien-Ming Chen:
On the Security of a Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks. Wirel. Pers. Commun. 136(2): 1079-1106 (2024) - 2023
- [j249]Muhammad Arslan Akram, Hira Ahmad, Adnan Noor Mian, Anca Delia Jurcut, Saru Kumari:
Blockchain-based privacy-preserving authentication protocol for UAV networks. Comput. Networks 224: 109638 (2023) - [j248]Pooja Tyagi, Saru Kumari, Mridul Kumar Gupta, Chien-Ming Chen, Tsu-Yang Wu, Sachin Kumar:
A secure protocol for patient monitoring in wireless body area networks. Concurr. Comput. Pract. Exp. 35(10) (2023) - [j247]Tsu-Yang Wu, Fangfang Kong, Qian Meng, Saru Kumari, Chien-Ming Chen:
Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture. EURASIP J. Wirel. Commun. Netw. 2023(1): 36 (2023) - [j246]Uddeshaya Kumar, Manish Garg, Saru Kumari, Dharminder Dharminder:
A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication. Trans. Emerg. Telecommun. Technol. 34(1) (2023) - [j245]Saru Kumari, Hu Xiong, Lyes Khoukhi, Joel J. P. C. Rodrigues:
Safety and security of autonomous vehicles. Trans. Emerg. Telecommun. Technol. 34(11) (2023) - [j244]Li Chen, Ke Zhang, Saru Kumari, Muhammad Khurram Khan, Zhiying Kong, Pradeep Chaudhary:
An efficient certificateless key exchange protocol for heterogeneous networks in human-centered IoT systems. Int. J. Commun. Syst. 36(12) (2023) - [j243]Yilong Ren, Jianru Xiao, Yanan Zhao, Han Jiang, Saru Kumari, Haiyang Yu:
PRS-HDMC: An online participant recruitment scheme for vehicular crowdsensing-enabled HD map collection. Internet Things 24: 100948 (2023) - [j242]Ke Wang, Chien-Ming Chen, Mohammad S. Obaidat, Saru Kumari, Sachin Kumar, Jinyi Long:
Deep Semantics Sorting of Voice-Interaction-Enabled Industrial Control System. IEEE Internet Things J. 10(4): 2793-2801 (2023) - [j241]Sriramulu Bojjagani, V. N. Sastry, Chien-Ming Chen, Saru Kumari, Muhammad Khurram Khan:
Systematic survey of mobile payments, protocols, and security infrastructure. J. Ambient Intell. Humaniz. Comput. 14(1): 609-654 (2023) - [j240]Meysam Ghahramani, Hamed HaddadPajouh, Reza Javidan, Saru Kumari:
VQR: vulnerability analysis in quadratic residues-based authentication protocols. J. Ambient Intell. Humaniz. Comput. 14(6): 7559-7574 (2023) - [j239]Anuradha Banerjee, Abu Sufian, Ashutosh Srivastava, Sachin Kumar Gupta, Saru Kumari, Sachin Kumar:
An energy and time-saving task scheduling algorithm for UAV-IoT collaborative system. Microprocess. Microsystems 101: 104875 (2023) - [j238]Narendra K. Dewangan, Preeti Chandrakar, Saru Kumari, Joel J. P. C. Rodrigues:
Enhanced privacy-preserving in student certificate management in blockchain and interplanetary file system. Multim. Tools Appl. 82(8): 12595-12614 (2023) - [j237]Muhammad Arslan Akram, Adnan Noor Mian, Saru Kumari:
Fog-based low latency and lightweight authentication protocol for vehicular communication. Peer Peer Netw. Appl. 16(2): 629-643 (2023) - [j236]Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari:
χperbp: a cloud-based lightweight mutual authentication protocol. Peer Peer Netw. Appl. 16(4): 1785-1802 (2023) - [j235]Alireza Souri, Eyhab Al-Masri, Saru Kumari:
Blockchain architecture and methodologies for internet of things environment. Secur. Priv. 6(2) (2023) - [j234]Xindi Ma, Qi Jiang, Mohammad Shojafar, Mamoun Alazab, Sachin Kumar, Saru Kumari:
DisBezant: Secure and Robust Federated Learning Against Byzantine Attack in IoT-Enabled MTS. IEEE Trans. Intell. Transp. Syst. 24(2): 2492-2502 (2023) - [j233]Dawei Wei, Junying Zhang, Mohammad Shojafar, Saru Kumari, Ning Xi, Jianfeng Ma:
Privacy-Aware Multiagent Deep Reinforcement Learning for Task Offloading in VANET. IEEE Trans. Intell. Transp. Syst. 24(11): 13108-13122 (2023) - [j232]Zahid Ghaffar, Salman Shamshad, Khalid Mahmood, Mohammad S. Obaidat, Saru Kumari, Muhammad Khurram Khan:
A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment. IEEE Trans. Netw. Sci. Eng. 10(1): 103-112 (2023) - [j231]Chien-Ming Chen, Zhen Li, Saru Kumari, Gautam Srivastava, Kuruva Lakshmanna, Thippa Reddy Gadekallu:
A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment. Veh. Commun. 39: 100567 (2023) - 2022
- [j230]Haleh Amintoosi, Mahdi Nikooghadam, Mohammad Shojafar, Saru Kumari, Mamoun Alazab:
Slight: A lightweight authentication scheme for smart healthcare services. Comput. Electr. Eng. 99: 107803 (2022) - [j229]Hu Xiong, Saru Kumari, Yue Cao:
Guest editorial: Introduction to the special section on sustainable security solutions for Internet of Vehicles (VSI-iov). Comput. Electr. Eng. 102: 108246 (2022) - [j228]Ali Shahidinejad, Mostafa Ghobaei-Arani, Alireza Souri, Mohammad Shojafar, Saru Kumari:
Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment. IEEE Consumer Electron. Mag. 11(2): 57-63 (2022) - [j227]Salman Shamshad, Muhammad Faizan Ayub, Khalid Mahmood, Saru Kumari, Shehzad Ashraf Chaudhry, Chien-Ming Chen:
An enhanced scheme for mutual authentication for healthcare services. Digit. Commun. Networks 8(2): 150-161 (2022) - [j226]Wenchao Li, Chuanjie Jin, Saru Kumari, Hu Xiong, Sachin Kumar:
Proxy re-encryption with equality test for secure data sharing in Internet of Things-based healthcare systems. Trans. Emerg. Telecommun. Technol. 33(10) (2022) - [j225]Alireza Souri, Vincenzo Piuri, Mohammad Shojafar, Eyhab Al-Masri, Saru Kumari:
Green energy-efficient computing solutions in Internet of Things communications. Int. J. Commun. Syst. 35(1) (2022) - [j224]Arun Kumar, Sharad Sharma, Nitin Goyal, Sachin Kumar Gupta, Saru Kumari, Sachin Kumar:
Energy-efficient fog computing in Internet of Things based on Routing Protocol for Low-Power and Lossy Network with Contiki. Int. J. Commun. Syst. 35(4) (2022) - [j223]Saru Kumari, Arun Kumar Sangaiah, Ankit Chaudhary, Jin Wang, Francesco Mercaldo:
Smart sensors in vehicular communication networks: Principles, algorithms, systems and applications. Int. J. Commun. Syst. 35(12) (2022) - [j222]Rahul Kumar, Mridul Kumar Gupta, Saru Kumari:
Cryptanalysis and improvement of an authentication scheme for IoT. Int. J. Inf. Comput. Secur. 19(1/2): 73-87 (2022) - [j221]Haleh Amintoosi, Mahdi Nikooghadam, Saru Kumari, Feng Jun, Hu Xiong, Sachin Kumar, Joel J. P. C. Rodrigues:
Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems. IEEE Internet Things J. 9(7): 5368-5379 (2022) - [j220]Hu Xiong, Lili Wang, Zhida Zhou, Zetong Zhao, Xin Huang, Saru Kumari:
Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message. IEEE Internet Things J. 9(13): 11248-11260 (2022) - [j219]Samad Rostampour, Nasour Bagheri, Ygal Bendavid, Masoumeh Safkhani, Saru Kumari, Joel J. P. C. Rodrigues:
An Authentication Protocol for Next Generation of Constrained IoT Systems. IEEE Internet Things J. 9(21): 21493-21504 (2022) - [j218]Prince Silas Kwesi Oberko, Victor-Hillary Kofi Setornyo Obeng, Hu Xiong, Saru Kumari:
A survey on Attribute-Based Signatures. J. Syst. Archit. 124: 102396 (2022) - [j217]Eric Ke Wang, Juntao Yu, Chien-Ming Chen, Saru Kumari, Joel J. P. C. Rodrigues:
Data Augmentation for Internet of Things Dialog System. Mob. Networks Appl. 27(1): 158-171 (2022) - [j216]Praphula Kumar Jain, Arjav Patel, Saru Kumari, Rajendra Pamula:
Predicting airline customers' recommendations using qualitative and quantitative contents of online reviews. Multim. Tools Appl. 81(5): 6979-6994 (2022) - [j215]Masoumeh Safkhani, Saru Kumari, Mohammad Shojafar, Sachin Kumar:
An authentication and key agreement scheme for smart grid. Peer-to-Peer Netw. Appl. 15(3): 1595-1616 (2022) - [j214]Tsu-Yang Wu, Qian Meng, Saru Kumari, Peng Zhang:
Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments. Sensors 22(10): 3858 (2022) - [j213]Chien-Ming Chen, Zhaoting Chen, Saru Kumari, Meng-Chang Lin:
LAP-IoHT: A Lightweight Authentication Protocol for the Internet of Health Things. Sensors 22(14): 5401 (2022) - [j212]Pooja Tyagi, Saru Kumari, Bander A. Alzahrani, Anshay Gupta, Ming-Hour Yang:
An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT. Sensors 22(22): 8793 (2022) - [j211]Tsu-Yang Wu, Fangfang Kong, Liyang Wang, Yeh-Cheng Chen, Saru Kumari, Jeng-Shyang Pan:
Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm. Sensors 22(23): 9174 (2022) - [j210]Nasour Bagheri, Saru Kumari, Carmen Camara, Pedro Peris-Lopez:
Defending Industry 4.0: An Enhanced Authentication Scheme for IoT Devices. IEEE Syst. J. 16(3): 4501-4512 (2022) - [j209]Hu Xiong, Minghao Yang, Ting Yao, Jinhao Chen, Saru Kumari:
Efficient Unbounded Fully Attribute Hiding Inner Product Encryption in Cloud-Aided WBANs. IEEE Syst. J. 16(4): 5424-5432 (2022) - [j208]Tsu-Yang Wu, Xinglan Guo, Yeh-Cheng Chen, Saru Kumari, Chien-Ming Chen:
SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing. Symmetry 14(7): 1393 (2022) - [j207]Shuming Qiu, Ding Wang, Guoai Xu, Saru Kumari:
Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices. IEEE Trans. Dependable Secur. Comput. 19(2): 1338-1351 (2022) - [j206]Akber Ali Khan, Vinod Kumar, Jangirala Srinivas, Saru Kumari, Mridul Kumar Gupta:
RAKS: robust authentication and key agreement scheme for satellite infrastructure. Telecommun. Syst. 81(1): 83-98 (2022) - [j205]Ke Wang, Chien-Ming Chen, Zhuoyu Tie, Mohammad Shojafar, Sachin Kumar, Saru Kumari:
Forward Privacy Preservation in IoT-Enabled Healthcare Systems. IEEE Trans. Ind. Informatics 18(3): 1991-1999 (2022) - [j204]Qing Fan, Jianhua Chen, Mohammad Shojafar, Saru Kumari, Debiao He:
SAKE*: A Symmetric Authenticated Key Exchange Protocol With Perfect Forward Secrecy for Industrial Internet of Things. IEEE Trans. Ind. Informatics 18(9): 6424-6434 (2022) - [j203]Dawei Wei, Ning Xi, Xindi Ma, Mohammad Shojafar, Saru Kumari, Jianfeng Ma:
Personalized Privacy-Aware Task Offloading for Edge-Cloud-Assisted Industrial Internet of Things in Automated Manufacturing. IEEE Trans. Ind. Informatics 18(11): 7935-7945 (2022) - [j202]Eric Ke Wang, Chien-Ming Chen, Mohammad Shojafar, Zhuoyu Tie, Mamoun Alazab, Saru Kumari:
AFFIRM: Provably Forward Privacy for Searchable Encryption in Cooperative Intelligent Transportation System. IEEE Trans. Intell. Transp. Syst. 23(11): 22607-22618 (2022) - [j201]Tsu-Yang Wu, Qian Meng, Lei Yang, Xinglan Guo, Saru Kumari:
A provably secure lightweight authentication protocol in mobile edge computing environments. J. Supercomput. 78(12): 13893-13914 (2022) - [j200]Rahman Hajian, Seyed Hossein Erfani, Saru Kumari:
A lightweight authentication and key agreement protocol for heterogeneous IoT with special attention to sensing devices and gateway. J. Supercomput. 78(15): 16678-16720 (2022) - [j199]Xindi Ma, Jianfeng Ma, Saru Kumari, Fushan Wei, Mohammad Shojafar, Mamoun Alazab:
Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing. ACM Trans. Internet Techn. 22(2): 45:1-45:24 (2022) - 2021
- [j198]Vankamamidi Srinivasa Naresh, Sivaranjani Reddi, Saru Kumari, V. V. L. Divakar Allavarpu, Sachin Kumar, Ming-Hour Yang:
Practical Identity Based Online/Off-Line Signcryption Scheme for Secure Communication in Internet of Things. IEEE Access 9: 21267-21278 (2021) - [j197]Amir Masoud Rahmani, Mokhtar Mohammadi, Jan Lansky, Stanislava Mildeová, Masoumeh Safkhani, Saru Kumari, Sarkhel H. Taher Karim, Mehdi Hosseinzadeh:
AMAPG: Advanced Mobile Authentication Protocol for GLOMONET. IEEE Access 9: 88256-88271 (2021) - [j196]Amir Masoud Rahmani, Mokhtar Mohammadi, Shima Rashidi, Jan Lansky, Stanislava Mildeová, Masoumeh Safkhani, Saru Kumari, Mehdi Hosseinzadeh:
Questioning the Security of Three Recent Authentication and Key Agreement Protocols. IEEE Access 9: 98204-98217 (2021) - [j195]Lyes Khoukhi, Hu Xiong, Saru Kumari, Nicolas Puech:
The Internet of vehicles and smart cities. Ann. des Télécommunications 76(9-10): 545-546 (2021) - [j194]Pranav Nerurkar, Sunil Bhirud, Dhiren R. Patel, Romaric Ludinard, Yann Busnel, Saru Kumari:
Supervised learning model for identifying illegal activities in Bitcoin. Appl. Intell. 51(6): 3824-3843 (2021) - [j193]Muhammad Umer, Imran Ashraf, Arif Mehmood, Saru Kumari, Saleem Ullah, Gyu Sang Choi:
Sentiment analysis of tweets using a unified convolutional neural network-long short-term memory network model. Comput. Intell. 37(1): 409-434 (2021) - [j192]Eric Ke Wang, Chien-Ming Chen, M. Shamim Hossain, Ghulam Muhammad, Sachin Kumar, Saru Kumari:
Transfer reinforcement learning-based road object detection in next generation IoT domain. Comput. Networks 193: 108078 (2021) - [j191]Minahil Rana, Muhammad Faizan Ayub, Khalid Mahmood, Saru Kumari, Arun Kumar Sangaiah:
Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology. Digit. Commun. Networks 7(2): 235-244 (2021) - [j190]Chien-Ming Chen, Yanyu Huang, King-Hang Wang, Saru Kumari, Mu-En Wu:
A secure authenticated and key exchange scheme for fog computing. Enterp. Inf. Syst. 15(9): 1200-1215 (2021) - [j189]Izwa Altaf, Muhammad Arslan Akram, Khalid Mahmood, Saru Kumari, Hu Xiong, Muhammad Khurram Khan:
A novel authentication and key-agreement scheme for satellite communication network. Trans. Emerg. Telecommun. Technol. 32(7) (2021) - [j188]Alireza Souri, Saru Kumari, Mohamed Elhoseny:
Privacy-aware resource management solutions in Internet of Things. Trans. Emerg. Telecommun. Technol. 32(8) (2021) - [j187]Dharminder Dharminder, Saru Kumari, Uddeshaya Kumar:
Post quantum secure conditional privacy preserving authentication for edge based vehicular communication. Trans. Emerg. Telecommun. Technol. 32(11) (2021) - [j186]Vinod Kumar, Musheer Ahmad, Adesh Kumari, Saru Kumari, Muhammad Khurram Khan:
SEBAP: A secure and efficient biometric-assisted authentication protocol using ECC for vehicular cloud computing. Int. J. Commun. Syst. 34(2) (2021) - [j185]Afzal Badshah, Anwar Ghani, Azeem Irshad, Husnain Naqvi, Saru Kumari:
Smart workload migration on external cloud service providers to minimize delay, running time, and transfer cost. Int. J. Commun. Syst. 34(3) (2021) - [j184]Michaelraj Kingston Roberts, Saru Kumari, Parthibaraj Anguraj:
Certain investigations on recent advances in the design of decoding algorithms using low-density parity-check codes and its applications. Int. J. Commun. Syst. 34(8) (2021) - [j183]Eric Ke Wang, Peng Xu, Chien-Ming Chen, Saru Kumari, Mohammad Shojafar, Mamoun Alazab:
Neural Architecture Search for Robust Networks in 6G-Enabled Massive IoT Domain. IEEE Internet Things J. 8(7): 5332-5339 (2021) - [j182]Yingzhe Hou, Hu Xiong, Xin Huang, Saru Kumari:
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen Key Attacks for Industrial Internet of Things. IEEE Internet Things J. 8(11): 8935-8948 (2021) - [j181]Hu Xiong, Yanan Zhao, Yingzhe Hou, Xin Huang, Chuanjie Jin, Lili Wang, Saru Kumari:
Heterogeneous Signcryption With Equality Test for IIoT Environment. IEEE Internet Things J. 8(21): 16142-16152 (2021) - [j180]Saddam Hussain, Insaf Ullah, Hizbullah Khattak, Muhammad Asghar Khan, Chien-Ming Chen, Saru Kumari:
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT). J. Inf. Secur. Appl. 58: 102625 (2021) - [j179]Vivek Dabra, Anju Bala, Saru Kumari:
Flaw and amendment of a two-party authenticated key agreement protocol for post-quantum environments. J. Inf. Secur. Appl. 61: 102889 (2021) - [j178]Insaf Ullah, Noor Ul Amin, Muhammad Asghar Khan, Hizbullah Khattak, Saru Kumari:
An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System. J. Medical Syst. 45(1): 4 (2021) - [j177]Pranav Nerurkar, Dhiren R. Patel, Yann Busnel, Romaric Ludinard, Saru Kumari, Muhammad Khurram Khan:
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009-2020). J. Netw. Comput. Appl. 177: 102940 (2021) - [j176]Chien-Ming Chen, Zhuoyu Tie, Eric Ke Wang, Muhammad Khurram Khan, Sachin Kumar, Saru Kumari:
Verifiable dynamic ranked search with forward privacy over encrypted cloud data. Peer-to-Peer Netw. Appl. 14(5): 2977-2991 (2021) - [j175]Tsu-Yang Wu, Tao Wang, Yu-Qi Lee, Weimin Zheng, Saru Kumari, Sachin Kumar:
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System. Secur. Commun. Networks 2021: 6658041:1-6658041:16 (2021) - [j174]Qian Mei, Hu Xiong, Jinhao Chen, Minghao Yang, Saru Kumari, Muhammad Khurram Khan:
Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV. IEEE Syst. J. 15(1): 245-256 (2021) - [j173]Salman Shamshad, Khalid Mahmood, Saru Kumari, Muhammad Khurram Khan:
Comments on "Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC". IEEE Syst. J. 15(1): 877-880 (2021) - [j172]Khalid Mahmood, Salman Shamshad, Saru Kumari, Muhammad Khurram Khan, Mohammad S. Obaidat:
Comment on "Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication". IEEE Syst. J. 15(1): 1366-1368 (2021) - [j171]Hu Xiong, Zhiqing Kang, Jinhao Chen, Junyi Tao, Chen Yuan, Saru Kumari:
A Novel Multiserver Authentication Scheme Using Proxy Resignature With Scalability and Strong User Anonymity. IEEE Syst. J. 15(2): 2156-2167 (2021) - [j170]Vivek Dabra, Anju Bala, Saru Kumari:
LBA-PAKE: Lattice-Based Anonymous Password Authenticated Key Exchange for Mobile Devices. IEEE Syst. J. 15(4): 5067-5077 (2021) - [j169]Vivek Dabra, Anju Bala, Saru Kumari:
Reconciliation based key exchange schemes using lattices: a review. Telecommun. Syst. 77(2): 413-434 (2021) - [j168]Eric Ke Wang, Xi Liu, Chien-Ming Chen, Saru Kumari, Mohammad Shojafar, M. Shamim Hossain:
Voice-Transfer Attacking on Industrial Voice Control Systems in 5G-Aided IIoT Domain. IEEE Trans. Ind. Informatics 17(10): 7085-7092 (2021) - [j167]Peng Wang, Chien-Ming Chen, Saru Kumari, Mohammad Shojafar, Rahim Tafazolli, Yi-Ning Liu:
HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs. IEEE Trans. Intell. Transp. Syst. 22(8): 5071-5080 (2021) - [j166]Eric Ke Wang, Fan Wang, Saru Kumari, Jyh-Haw Yeh, Chien-Ming Chen:
Intelligent monitor for typhoon in IoT system of smart city. J. Supercomput. 77(3): 3024-3043 (2021) - [j165]Tsu-Yang Wu, Lei Yang, Zhiyuan Lee, Shu-Chuan Chu, Saru Kumari, Sachin Kumar:
A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2021: 5537018:1-5537018:15 (2021) - [j164]Saru Kumari, Km. Renuka:
Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services. Wirel. Pers. Commun. 117(1): 27-45 (2021) - [j163]Mahdi Nikooghadam, Haleh Amintoosi, Saru Kumari:
On the Security of "Secure and Lightweight Authentication with Key Agreement for Smart Wearable Systems". Wirel. Pers. Commun. 120(1): 1-8 (2021) - 2020
- [j162]Tsu-Yang Wu, Zhiyuan Lee, Mohammad S. Obaidat, Saru Kumari, Sachin Kumar, Chien-Ming Chen:
An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks. IEEE Access 8: 28096-28108 (2020) - [j161]Izwa Altaf, Muhammad Asad Saleem, Khalid Mahmood, Saru Kumari, Pradeep Chaudhary, Chien-Ming Chen:
A Lightweight Key Agreement and Authentication Scheme for Satellite-Communication Systems. IEEE Access 8: 46278-46287 (2020) - [j160]Bander A. Alzahrani, Khalid Mahmood, Saru Kumari:
Lightweight Authentication Protocol for NFC Based Anti-Counterfeiting System in IoT Infrastructure. IEEE Access 8: 76357-76367 (2020) - [j159]Saddam Hussain, Insaf Ullah, Hizbullah Khattak, Muhammad Adnan, Saru Kumari, Syed Sajid Ullah, Muhammad Asghar Khan, Shah Jahan Khattak:
A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid. IEEE Access 8: 93230-93248 (2020) - [j158]Adesh Kumari, Vinod Kumar, M. Yahya Abbasi, Saru Kumari, Pradeep Chaudhary, Chien-Ming Chen:
CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC. IEEE Access 8: 107838-107852 (2020) - [j157]Shafiq Ahmed, Saru Kumari, Muhammad Asad Saleem, Kadambri Agarwal, Khalid Mahmood, Ming-Hour Yang:
Anonymous Key-Agreement Protocol for V2G Environment Within Social Internet of Vehicles. IEEE Access 8: 119829-119839 (2020) - [j156]Mehdi Hosseinzadeh, Omed Hassan Ahmed, Sarkar Hasan Ahmed, Cuong Trinh, Nasour Bagheri, Saru Kumari, Jan Lansky, Bao Huynh:
An Enhanced Authentication Protocol for RFID Systems. IEEE Access 8: 126977-126987 (2020) - [j155]Cuong Trinh, Bao Huynh, Jan Lansky, Stanislava Mildeová, Masoumeh Safkhani, Nasour Bagheri, Saru Kumari, Mehdi Hosseinzadeh:
A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments. IEEE Access 8: 165536-165550 (2020) - [j154]Masoumeh Safkhani, Nasour Bagheri, Saru Kumari, Hamidreza Tavakoli, Sachin Kumar, Jiahui Chen:
RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications. IEEE Access 8: 200851-200862 (2020) - [j153]Fan Wu, Xiong Li, Lili Xu, Saru Kumari, Dingbao Lin, Joel J. P. C. Rodrigues:
An anonymous and identity-trackable data transmission scheme for smart grid under smart city notion. Ann. des Télécommunications 75(7-8): 307-317 (2020) - [j152]Hongfeng Zhu, Xueying Wang, Chien-Ming Chen, Saru Kumari:
Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain. Comput. Electr. Eng. 86: 106714 (2020) - [j151]Eric Ke Wang, Chien-Ming Chen, Fan Wang, Muhammad Khurram Khan, Saru Kumari:
Joint-learning segmentation in Internet of drones (IoD)-based monitor systems. Comput. Commun. 152: 54-62 (2020) - [j150]Fan Wu, Xiong Li, Lili Xu, Saru Kumari:
A privacy-preserving scheme with identity traceable property for smart grid. Comput. Commun. 157: 38-44 (2020) - [j149]Ning Lu, Yongxin Zhang, Wenbo Shi, Saru Kumari, Kim-Kwang Raymond Choo:
A secure and scalable data integrity auditing scheme based on hyperledger fabric. Comput. Secur. 92: 101741 (2020) - [j148]Eric Ke Wang, RuiPei Sun, Chien-Ming Chen, Zuodong Liang, Saru Kumari, Muhammad Khurram Khan:
Proof of X-repute blockchain consensus protocol for IoT systems. Comput. Secur. 95: 101871 (2020) - [j147]Yanan Zhao, Yingzhe Hou, Lili Wang, Saru Kumari, Muhammad Khurram Khan, Hu Xiong:
An efficient certificateless aggregate signature scheme for the Internet of Vehicles. Trans. Emerg. Telecommun. Technol. 31(5) (2020) - [j146]Muhammad Asad Saleem, Shafiq Ahmed, Khalid Mahmood, Saru Kumari, Hu Xiong:
An enhanced authentication protocol for client server environment. Frontiers Comput. Sci. 14(6): 146810 (2020) - [j145]Eric Ke Wang, Zuodong Liang, Chien-Ming Chen, Saru Kumari, Muhammad Khurram Khan:
PoRX: A reputation incentive scheme for blockchain consensus of IIoT. Future Gener. Comput. Syst. 102: 140-151 (2020) - [j144]Muhammad Arslan Akram, Zahid Ghaffar, Khalid Mahmood, Saru Kumari, Kadambri Agarwal, Chien-Ming Chen:
An anonymous authenticated key-agreement scheme for multi-server infrastructure. Hum. centric Comput. Inf. Sci. 10: 22 (2020) - [j143]Hui Zhang, Saru Kumari, Mohammad S. Obaidat, Fushan S. Wei:
Gateway-oriented two-server password authenticated key exchange protocol for unmanned aerial vehicles in mobile edge computing. IET Commun. 14(15): 2427-2433 (2020) - [j142]Saru Kumari, Km. Renuka:
A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs. Int. J. Commun. Syst. 33(3) (2020) - [j141]Khalid Mahmood, Aniqa Rehman, Pradeep Chaudhary, Xiong Li, Fan Wu, Saru Kumari:
Revised anonymous authentication protocol for adaptive client-server infrastructure. Int. J. Commun. Syst. 33(4) (2020) - [j140]Muhammad Naeem, Shehzad Ashraf Chaudhry, Khalid Mahmood, Marimuthu Karuppiah, Saru Kumari:
A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things. Int. J. Commun. Syst. 33(13) (2020) - [j139]Zijian Bao, Wenbo Shi, Saru Kumari, Zhiyin Kong, Chien-Ming Chen:
Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity. Int. J. Inf. Sec. 19(3): 311-321 (2020) - [j138]Muhammad Asad Saleem, Khalid Mahmood, Saru Kumari:
Comments on "AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment". IEEE Internet Things J. 7(5): 4671-4675 (2020) - [j137]Muhammad Arslan Akram, Khalid Mahmood, Saru Kumari, Hu Xiong:
Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0". IEEE Internet Things J. 7(5): 4676-4681 (2020) - [j136]Hu Xiong, Yan Wu, Chuanjie Jin, Saru Kumari:
Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT. IEEE Internet Things J. 7(12): 11713-11724 (2020) - [j135]Mahdi Nikooghadam, Haleh Amintoosi, Saru Kumari:
A provably secure ECC-based roaming authentication scheme for global mobility networks. J. Inf. Secur. Appl. 54: 102588 (2020) - [j134]Muhammad Faizan Ayub, Muhammad Asad Saleem, Izwa Altaf, Khalid Mahmood, Saru Kumari:
Fuzzy extraction and PUF based three party authentication protocol using USB as mass storage device. J. Inf. Secur. Appl. 55: 102585 (2020) - [j133]Salman Shamshad, Minahil Rana, Khalid Mahmood, Saru Kumari, Chien-Ming Chen:
A secure blockchain-based e-health records storage and sharing scheme. J. Inf. Secur. Appl. 55: 102590 (2020) - [j132]Akasha Shafiq, Muhammad Faizan Ayub, Khalid Mahmood, Mazhar Sadiq, Saru Kumari, Chien-Ming Chen:
An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure. J. Sensors 2020: 8829319:1-8829319:17 (2020) - [j131]R. Shashidhara, Sriramulu Bojjagani, Anup Kumar Maurya, Saru Kumari, Hu Xiong:
A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments. Peer-to-Peer Netw. Appl. 13(6): 1943-1966 (2020) - [j130]Shu-Chuan Chu, Lili Chen, Sachin Kumar, Saru Kumari, Joel J. P. C. Rodrigues, Chien-Ming Chen:
Decentralized Private Information Sharing Protocol on Social Networks. Secur. Commun. Networks 2020: 7137480:1-7137480:12 (2020) - [j129]Mostafa Yavari, Masoumeh Safkhani, Saru Kumari, Sachin Kumar, Chien-Ming Chen:
An Improved Blockchain-Based Authentication Protocol for IoT Network Management. Secur. Commun. Networks 2020: 8836214:1-8836214:16 (2020) - [j128]Rubi Arya, Pitam Singh, Saru Kumari, Mohammad S. Obaidat:
An approach for solving fully fuzzy multi-objective linear fractional optimization problems. Soft Comput. 24(12): 9105-9119 (2020) - [j127]Vinod Kumar, Musheer Ahmad, Dheerendra Mishra, Saru Kumari, Muhammad Khurram Khan:
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing. Veh. Commun. 22: 100213 (2020) - [j126]Salman Shamshad, Khalid Mahmood, Saru Kumari:
Comments on "A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things". Wirel. Pers. Commun. 112(1): 463-466 (2020) - 2019
- [j125]Saru Kumari, Pradeep Chaudhary, Chien-Ming Chen, Muhammad Khurram Khan:
Questioning Key Compromise Attack on Ostad-Sharif et al.'s Authentication and Session key Generation Scheme for Healthcare Applications. IEEE Access 7: 39717-39720 (2019) - [j124]Km. Renuka, Saru Kumari, Dongning Zhao, Li Li:
Design of a Secure Password-Based Authentication Scheme for M2M Networks in IoT Enabled Cyber-Physical Systems. IEEE Access 7: 51014-51027 (2019) - [j123]Mengli Zhang, Gang Zhou, Muhammad Khurram Khan, Saru Kumari, Xuexian Hu, Wenfen Liu:
SPSR-FSPG: A Fast Simulative Password Set Generation Algorithm. IEEE Access 7: 155107-155119 (2019) - [j122]Marko Kompara, Saru Kumari, Marko Hölbl:
Analysis and improvement of a secure key management protocol for e-health applications. Comput. Electr. Eng. 73: 97-113 (2019) - [j121]Imran Ashraf, Soojung Hur, Muhammad Shafiq, Saru Kumari, Yongwan Park:
GUIDE: Smartphone sensors-based pedestrian indoor localization with heterogeneous devices. Int. J. Commun. Syst. 32(15) (2019) - [j120]Khalid Mahmood, Jehangir Arshad, Shehzad Ashraf Chaudhry, Saru Kumari:
An enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure. Int. J. Commun. Syst. 32(16) (2019) - [j119]Xiong Li, Shanpeng Liu, Fan Wu, Saru Kumari, Joel J. P. C. Rodrigues:
Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications. IEEE Internet Things J. 6(3): 4755-4763 (2019) - [j118]Majid Bayat, Zahra Zare Jousheghani, Ashok Kumar Das, Pitam Singh, Saru Kumari, Mohammad Reza Aref:
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications. ISC Int. J. Inf. Secur. 11(2): 113-128 (2019) - [j117]Jangirala Srinivas, Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari, Vandana Guleria:
An Authentication Framework for Roaming Service in Global Mobility Networks. Inf. Technol. Control. 48(1): 129-145 (2019) - [j116]Azeem Irshad, Shehzad Ashraf Chaudhry, Muhammad Shafiq, Muhammad Usman, Muhammad Asif, Saru Kumari:
An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol. Inf. Technol. Control. 48(2): 211-224 (2019) - [j115]Jiaqi Wang, Marimuthu Karuppiah, Saru Kumari, Zhiyin Kong, Wenbo Shi:
A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification. J. Intell. Fuzzy Syst. 36(5): 4215-4226 (2019) - [j114]Km. Renuka, Saru Kumari, Xiong Li:
Design of a Secure Three-Factor Authentication Scheme for Smart Healthcare. J. Medical Syst. 43(5): 133:1-133:12 (2019) - [j113]JiLiang Li, WeiGuo Zhang, Vivek Dabra, Kim-Kwang Raymond Choo, Saru Kumari, Dieter Hogrefe:
AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities. J. Netw. Comput. Appl. 134: 52-61 (2019) - [j112]Xiong Li, Fan Wu, Saru Kumari, Lili Xu, Arun Kumar Sangaiah, Kim-Kwang Raymond Choo:
A provably secure and anonymous message authentication scheme for smart grids. J. Parallel Distributed Comput. 132: 242-249 (2019) - [j111]Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Saru Kumari, Fan Wu, Shehzad Ashraf Chaudhry, Niranchana Radhakrishnan:
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment. Mob. Networks Appl. 24(3): 1046-1062 (2019) - [j110]Pitam Singh, Ashish Kumar Singh, Priyamvada Singh, Saru Kumari, Arun Kumar Sangaiah:
Multimodal data modeling for efficiency assessment of social priority based urban bus route transportation system using GIS and data envelopment analysis. Multim. Tools Appl. 78(17): 23897-23915 (2019) - [j109]Km. Renuka, Sachin Kumar, Saru Kumari, Chien-Ming Chen:
Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks. Sensors 19(21): 4625 (2019) - [j108]Azeem Irshad, Shehzad Ashraf Chaudhry, Muhammad Sher, Bander A. Alzahrani, Saru Kumari, Xiong Li, Fan Wu:
An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre. IEEE Syst. J. 13(1): 436-446 (2019) - [j107]Fan Wu, Lili Xu, Xiong Li, Saru Kumari, Marimuthu Karuppiah, Mohammad S. Obaidat:
A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography. IEEE Syst. J. 13(3): 2830-2838 (2019) - [j106]Deepika Agarwal, Pitam Singh, Deepak Bhati, Saru Kumari, Mohammad S. Obaidat:
Duality-based branch-bound computational algorithm for sum-of-linear-fractional multi-objective optimization problem. Soft Comput. 23(1): 197-210 (2019) - [j105]Deepika Agarwal, Pitam Singh, Xiong Li, Saru Kumari:
Optimality criteria for fuzzy-valued fractional multi-objective optimization problem. Soft Comput. 23(19): 9049-9067 (2019) - [j104]Pankaj Kumar Sa, Saru Kumari, Vishnu Sharma, Xiong Li, Arun Kumar Sangaiah, SK Hafizul Islam:
Secure CLS and CL-AS schemes designed for VANETs. J. Supercomput. 75(6): 3076-3098 (2019) - 2018
- [j103]Marimuthu Karuppiah, Xiong Li, Ashok Kumar Das, Saru Kumari, Qin Liu:
Introduction to the special section on Big data and IoT in e-healthcare. Comput. Electr. Eng. 65: 261-264 (2018) - [j102]Fan Wu, Xiong Li, Lili Xu, Saru Kumari, Arun Kumar Sangaiah:
A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput. Electr. Eng. 68: 107-118 (2018) - [j101]Sravani Challa, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Saru Kumari, Muhammad Khurram Khan, Athanasios V. Vasilakos:
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput. Electr. Eng. 69: 534-554 (2018) - [j100]Marimuthu Karuppiah, Xiong Li, Ashok Kumar Das, Saru Kumari, Qin Liu:
Introduction to the special section on Big data and IoT in e-healthcare. Comput. Electr. Eng. 70: 1092-1095 (2018) - [j99]Javad Khodadoust, Ali Mohammad Khodadoust, Xiong Li, Saru Kumari:
Design and implementation of a multibiometric system based on hand's traits. Expert Syst. Appl. 97: 303-314 (2018) - [j98]JiLiang Li, WeiGuo Zhang, Saru Kumari, Kim-Kwang Raymond Choo, Dieter Hogrefe:
Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps. Trans. Emerg. Telecommun. Technol. 29(6) (2018) - [j97]Khalid Mahmood, Shehzad Ashraf Chaudhry, Husnain Naqvi, Saru Kumari, Xiong Li, Arun Kumar Sangaiah:
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Gener. Comput. Syst. 81: 557-565 (2018) - [j96]Fan Wu, Xiong Li, Arun Kumar Sangaiah, Lili Xu, Saru Kumari, Liuxi Wu, Jian Shen:
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Gener. Comput. Syst. 82: 727-737 (2018) - [j95]Xiong Li, Jianwei Niu, Saru Kumari, Fan Wu, Kim-Kwang Raymond Choo:
A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city. Future Gener. Comput. Syst. 83: 607-618 (2018) - [j94]Rifaqat Ali, Arup Kumar Pal, Saru Kumari, Marimuthu Karuppiah, Mauro Conti:
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Future Gener. Comput. Syst. 84: 200-215 (2018) - [j93]Khalid Mahmood, Xiong Li, Shehzad Ashraf Chaudhry, Husnain Naqvi, Saru Kumari, Arun Kumar Sangaiah, Joel J. P. C. Rodrigues:
Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure. Future Gener. Comput. Syst. 88: 491-500 (2018) - [j92]Sandip Roy, Santanu Chatterjee, Ashok Kumar Das, Samiran Chattopadhyay, Saru Kumari, Minho Jo:
Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things. IEEE Internet Things J. 5(4): 2884-2895 (2018) - [j91]Wenfen Liu, Gang Zhou, Jianghong Wei, Xuexian Hu, Saru Kumari:
Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks. Inf. Technol. Control. 47(2): 275-294 (2018) - [j90]Azeem Irshad, Muhammad Sher, Bander A. Alzahrani, Aiiad Albeshri, Shehzad Ashraf Chaudhry, Saru Kumari:
Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al. KSII Trans. Internet Inf. Syst. 12(1): 523-549 (2018) - [j89]Saru Kumari, Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Fan Wu, Vidushi Gupta:
Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography. J. Ambient Intell. Humaniz. Comput. 9(3): 643-653 (2018) - [j88]Jangirala Srinivas, Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari:
Provably secure biometric based authentication and key agreement protocol for wireless sensor networks. J. Ambient Intell. Humaniz. Comput. 9(4): 875-895 (2018) - [j87]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Ashok Kumar Das, Jian Shen:
A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. J. Ambient Intell. Humaniz. Comput. 9(4): 919-930 (2018) - [j86]Xiong Li, Jianwei Niu, Saru Kumari, Fan Wu, Arun Kumar Sangaiah, Kim-Kwang Raymond Choo:
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl. 103: 194-204 (2018) - [j85]Azeem Irshad, Muhammad Sher, Shehzad Ashraf Chaudhry, Qi Xie, Saru Kumari, Fan Wu:
An improved and secure chaotic map based authenticated key agreement in multi-server architecture. Multim. Tools Appl. 77(1): 1167-1204 (2018) - [j84]Saru Kumari, Ashok Kumar Das, Xiong Li, Fan Wu, Muhammad Khurram Khan, Qi Jiang, SK Hafizul Islam:
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments. Multim. Tools Appl. 77(2): 2359-2389 (2018) - [j83]Azeem Irshad, Muhammad Sher, Shehzad Ashraf Chaudhry, Saru Kumari, Arun Kumar Sangaiah, Xiong Li, Fan Wu:
A secure mutual authenticated key agreement of user with multiple servers for critical systems. Multim. Tools Appl. 77(9): 11067-11099 (2018) - [j82]Fan Wu, Lili Xu, Saru Kumari, Xiong Li:
An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw. Appl. 11(1): 1-20 (2018) - [j81]Pankaj Kumar Sa, Saru Kumari, Vishnu Sharma, Arun Kumar Sangaiah, Jianghong Wei, Xiong Li:
A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustain. Comput. Informatics Syst. 18: 80-89 (2018) - [j80]Xiong Li, Maged Hamada Ibrahim, Saru Kumari, Rahul Kumar:
Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors. Telecommun. Syst. 67(2): 323-348 (2018) - [j79]Xiong Li, Jianwei Niu, Md. Zakirul Alam Bhuiyan, Fan Wu, Marimuthu Karuppiah, Saru Kumari:
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(8): 3599-3609 (2018) - [j78]Azeem Irshad, Husnain Naqvi, Shehzad Ashraf Chaudhry, Shouket Raheem, Saru Kumari, Ambrina Kanwal, Muhammad Usman:
An efficient and secure design of multi-server authenticated key agreement protocol. J. Supercomput. 74(9): 4771-4797 (2018) - [j77]Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, Vanga Odelu:
Attribute-based authentication on the cloud for thin clients. J. Supercomput. 74(11): 5813-5845 (2018) - [j76]Saru Kumari, Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Fan Wu, Neeraj Kumar:
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J. Supercomput. 74(12): 6428-6453 (2018) - [j75]JiLiang Li, Kim-Kwang Raymond Choo, WeiGuo Zhang, Saru Kumari, Joel J. P. C. Rodrigues, Muhammad Khurram Khan, Dieter Hogrefe:
EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Veh. Commun. 13: 104-113 (2018) - 2017
- [j74]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Muhammad Khurram Khan, Ashok Kumar Das:
An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann. des Télécommunications 72(3-4): 131-144 (2017) - [j73]Xiong Li, Jieyao Peng, Saru Kumari, Fan Wu, Marimuthu Karuppiah, Kim-Kwang Raymond Choo:
An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Comput. Electr. Eng. 61: 238-249 (2017) - [j72]Fan Wu, Xiong Li, Lili Xu, Saru Kumari, Marimuthu Karuppiah, Jian Shen:
A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server. Comput. Electr. Eng. 63: 168-181 (2017) - [j71]Xiong Li, Maged Hamada Ibrahim, Saru Kumari, Arun Kumar Sangaiah, Vidushi Gupta, Kim-Kwang Raymond Choo:
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput. Networks 129: 429-443 (2017) - [j70]Saru Kumari, Ashok Kumar Das, Mohammad Wazid, Xiong Li, Fan Wu, Kim-Kwang Raymond Choo, Muhammad Khurram Khan:
On the design of a secure user authentication and key agreement scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j69]Vanga Odelu, Ashok Kumar Das, Y. Sreenivasa Rao, Saru Kumari, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput. Stand. Interfaces 54: 3-9 (2017) - [j68]Vanga Odelu, Ashok Kumar Das, Saru Kumari, Xinyi Huang, Mohammad Wazid:
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Gener. Comput. Syst. 68: 74-88 (2017) - [j67]Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Kim-Kwang Raymond Choo, Jian Shen:
Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Gener. Comput. Syst. 68: 320-330 (2017) - [j66]Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari, Saru Kumari:
Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Int. J. Commun. Syst. 30(1) (2017) - [j65]Dheerendra Mishra, Saru Kumari, Muhammad Khurram Khan, Sourav Mukhopadhyay:
An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems. Int. J. Commun. Syst. 30(1) (2017) - [j64]Mohammad Sabzinejad Farash, Shehzad Ashraf Chaudhry, Mohammad Heydari, Seyed Mohammad Sajad Sadough, Saru Kumari, Muhammad Khurram Khan:
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst. 30(4) (2017) - [j63]Azeem Irshad, Shehzad Ashraf Chaudhry, Saru Kumari, Muhammad Usman, Khalid Mahmood, Ch. Muhammad Shahzad Faisal:
An improved lightweight multiserver authentication scheme. Int. J. Commun. Syst. 30(17) (2017) - [j62]Rajkumar Soundrapandiyan, Marimuthu Karuppiah, Saru Kumari, Sanjay Kumar Tyagi, Fan Wu, Ki-Hyun Jung:
An Efficient DWT and Intuitionistic Fuzzy Based Multimodality Medical Image Fusion. Int. J. Imaging Syst. Technol. 27(2): 118-132 (2017) - [j61]Fan Wu, Lili Xu, Saru Kumari, Xiong Li:
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. J. Ambient Intell. Humaniz. Comput. 8(1): 101-116 (2017) - [j60]SK Hafizul Islam, Ruhul Amin, G. P. Biswas, Mohammad Sabzinejad Farash, Xiong Li, Saru Kumari:
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. J. King Saud Univ. Comput. Inf. Sci. 29(3): 311-324 (2017) - [j59]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Jian Shen, Kim-Kwang Raymond Choo, Mohammad Wazid, Ashok Kumar Das:
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 89: 72-85 (2017) - [j58]Fan Wu, Lili Xu, Saru Kumari, Xiong Li:
An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multim. Syst. 23(2): 195-205 (2017) - [j57]Saru Kumari:
Design flaws of "an anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography". Multim. Tools Appl. 76(11): 13581-13583 (2017) - [j56]Azeem Irshad, Muhammad Sher, Omer Nawaz, Shehzad Ashraf Chaudhry, Imran Khan, Saru Kumari:
A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme. Multim. Tools Appl. 76(15): 16463-16489 (2017) - [j55]Nishant Doshi, Saru Kumari, Dheerendra Mishra, Xiong Li, Kim-Kwang Raymond Choo, Arun Kumar Sangaiah:
A password based authentication scheme for wireless multimedia systems. Multim. Tools Appl. 76(24): 25893-25918 (2017) - [j54]Fan Wu, Lili Xu, Saru Kumari, Xiong Li:
A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Netw. Appl. 10(1): 16-30 (2017) - [j53]Omid Mir, Jorge Munilla, Saru Kumari:
Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks. Peer-to-Peer Netw. Appl. 10(1): 79-91 (2017) - [j52]Saru Kumari, Shehzad Ashraf Chaudhry, Fan Wu, Xiong Li, Mohammad Sabzinejad Farash, Muhammad Khurram Khan:
An improved smart card based authentication scheme for session initiation protocol. Peer-to-Peer Netw. Appl. 10(1): 92-105 (2017) - [j51]Xiong Li, Arun Kumar Sangaiah, Saru Kumari, Fan Wu, Jian Shen, Muhammad Khurram Khan:
An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city. Pers. Ubiquitous Comput. 21(5): 791-805 (2017) - [j50]Ruhul Amin, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri, Saru Kumari:
A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments. Secur. Commun. Networks 2017: 5989151:1-5989151:15 (2017) - [j49]Marimuthu Karuppiah, Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Muhammad Khurram Khan, R. Saravanan, Sayantani Basu:
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 93(2): 383-407 (2017) - [j48]Azeem Irshad, Muhammad Sher, Muhammad Usman Ashraf, Bander A. Alzahrani, Fan Wu, Qi Xie, Saru Kumari:
An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme. Wirel. Pers. Commun. 95(3): 3185-3208 (2017) - [j47]Vanga Odelu, Soumya Banerjee, Ashok Kumar Das, Samiran Chattopadhyay, Saru Kumari, Xiong Li, Adrijit Goswami:
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 96(2): 2351-2387 (2017) - [j46]Xiong Li, Saru Kumari, Jian Shen, Fan Wu, Cai-Sen Chen, SK Hafizul Islam:
Secure Data Access and Sharing Scheme for Cloud Storage. Wirel. Pers. Commun. 96(4): 5295-5314 (2017) - [j45]Azeem Irshad, Saru Kumari, Xiong Li, Fan Wu, Shehzad Ashraf Chaudhry, Hamed Arshad:
An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification. Wirel. Pers. Commun. 97(2): 2145-2166 (2017) - 2016
- [j44]Mohammad Sabzinejad Farash, Muhamed Turkanovic, Saru Kumari, Marko Hölbl:
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Networks 36: 152-176 (2016) - [j43]Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, Mohammad Wazid, Vanga Odelu:
Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput. Methods Programs Biomed. 135: 37-50 (2016) - [j42]Anil Kumar Sutrala, Ashok Kumar Das, Vanga Odelu, Mohammad Wazid, Saru Kumari:
Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems. Comput. Methods Programs Biomed. 135: 167-185 (2016) - [j41]Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Hamed Arshad, Muhammad Khurram Khan:
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gener. Comput. Syst. 63: 56-75 (2016) - [j40]Saru Kumari, Muhammad Khurram Khan, Xiong Li, Fan Wu:
Design of a user anonymous password authentication scheme without smart card. Int. J. Commun. Syst. 29(3): 441-458 (2016) - [j39]Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Vanga Odelu, Muhammad Khurram Khan:
A User Anonymous Mutual Authentication Protocol. KSII Trans. Internet Inf. Syst. 10(9): 4508-4528 (2016) - [j38]Xiong Li, Kaihui Wang, Jian Shen, Saru Kumari, Fan Wu, Yonghua Hu:
An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems. J. Ambient Intell. Humaniz. Comput. 7(3): 427-443 (2016) - [j37]Xiong Li, Jianwei Niu, Marimuthu Karuppiah, Saru Kumari, Fan Wu:
Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications. J. Medical Syst. 40(12): 268:1-268:12 (2016) - [j36]Saru Kumari, Muhammad Khurram Khan, Xiong Li:
A more secure digital rights management authentication scheme based on smart card. Multim. Tools Appl. 75(2): 1135-1158 (2016) - [j35]Mohammad Sabzinejad Farash, Saru Kumari, Majid Bakhtiari:
Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography. Multim. Tools Appl. 75(8): 4485-4504 (2016) - [j34]Saru Kumari, Fan Wu, Xiong Li, Mohammad Sabzinejad Farash, Qi Jiang, Muhammad Khurram Khan, Ashok Kumar Das:
Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card. Multim. Tools Appl. 75(24): 17215-17245 (2016) - [j33]Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li, Fan Wu:
Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS. Secur. Commun. Networks 9(13): 1983-2001 (2016) - [j32]Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid, Xiong Li:
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Secur. Commun. Networks 9(13): 2070-2092 (2016) - [j31]Xiong Li, Jianwei Niu, Saru Kumari, Junguo Liao, Wei Liang, Muhammad Khurram Khan:
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur. Commun. Networks 9(15): 2643-2655 (2016) - [j30]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Ashok Kumar Das, Muhammad Khurram Khan, Marimuthu Karuppiah, Renuka Baliyan:
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur. Commun. Networks 9(16): 3527-3542 (2016) - [j29]Ashok Kumar Das, Saru Kumari, Vanga Odelu, Xiong Li, Fan Wu, Xinyi Huang:
Provably secure user authentication and key agreement scheme for wireless sensor networks. Secur. Commun. Networks 9(16): 3670-3687 (2016) - [j28]Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li, Fan Wu:
Provably secure biometric-based user authentication and key agreement scheme in cloud computing. Secur. Commun. Networks 9(17): 4103-4119 (2016) - [j27]Marimuthu Karuppiah, Saru Kumari, Ashok Kumar Das, Xiong Li, Fan Wu, Sayantani Basu:
A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks. Secur. Commun. Networks 9(17): 4192-4209 (2016) - [j26]Saru Kumari, Marimuthu Karuppiah, Xiong Li, Fan Wu, Ashok Kumar Das, Vanga Odelu:
An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks. Secur. Commun. Networks 9(17): 4255-4271 (2016) - [j25]Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Muhammad Khurram Khan:
Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Secur. Commun. Networks 9(17): 4596-4614 (2016) - [j24]Sravani Challa, Ashok Kumar Das, Saru Kumari, Vanga Odelu, Fan Wu, Xiong Li:
Provably secure three-factor authentication and key agreement scheme for session initiation protocol. Secur. Commun. Networks 9(18): 5412-5431 (2016) - [j23]Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, Vanga Odelu:
Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks. Secur. Commun. Networks 9(18): 5563-5580 (2016) - [j22]Xiong Li, Jianwei Niu, Saru Kumari, SK Hafizul Islam, Fan Wu, Muhammad Khurram Khan, Ashok Kumar Das:
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security. Wirel. Pers. Commun. 89(2): 569-597 (2016) - 2015
- [j21]Saru Kumari, Muhammad Khurram Khan, Mohammed Atiquzzaman:
User authentication schemes for wireless sensor networks: A review. Ad Hoc Networks 27: 159-194 (2015) - [j20]Fan Wu, Lili Xu, Saru Kumari, Xiong Li:
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Comput. Electr. Eng. 45: 274-285 (2015) - [j19]Muhammad Khurram Khan, Ankita Chaturvedi, Dheerendra Mishra, Saru Kumari:
On the security enhancement of integrated electronic patient records information systems. Comput. Sci. Inf. Syst. 12(2): 857-872 (2015) - [j18]Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Husnain Naqvi, Saru Kumari, Muhammad Khurram Khan:
An enhanced privacy preserving remote user authentication scheme with provable security. Secur. Commun. Networks 8(18): 3782-3795 (2015) - [j17]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Abdulhameed Alelaiwi:
A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof. Secur. Commun. Networks 8(18): 3847-3863 (2015) - [j16]Xiong Li, Jianwei Niu, Saru Kumari, Junguo Liao, Wei Liang:
An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture. Wirel. Pers. Commun. 80(1): 175-192 (2015) - [j15]Xiong Li, Junguo Liao, Saru Kumari, Wei Liang, Fan Wu, Muhammad Khurram Khan:
A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design. Wirel. Pers. Commun. 85(1): 263-288 (2015) - 2014
- [j14]Saru Kumari, Muhammad Khurram Khan, Xiong Li:
An improved remote user authentication scheme with key agreement. Comput. Electr. Eng. 40(6): 1997-2012 (2014) - [j13]Muhammad Khurram Khan, Saru Kumari, Mridul Kumar Gupta:
More efficient key-hash based fingerprint remote authentication scheme using mobile device. Computing 96(9): 793-816 (2014) - [j12]Saru Kumari, Muhammad Khurram Khan:
Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'. Int. J. Commun. Syst. 27(12): 3939-3955 (2014) - [j11]Muhammad Khurram Khan, Saru Kumari:
An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j10]Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari, Muhammad Khurram Khan, Ankita Chaturvedi:
Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce. J. Medical Syst. 38(5): 41 (2014) - [j9]Dheerendra Mishra, Sourav Mukhopadhyay, Ankita Chaturvedi, Saru Kumari, Muhammad Khurram Khan:
Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. J. Medical Syst. 38(6): 24 (2014) - [j8]Muhammad Khurram Khan, Saru Kumari:
Cryptanalysis and Improvement of "An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems". Secur. Commun. Networks 7(2): 399-408 (2014) - [j7]Saru Kumari, Mridul Kumar Gupta, Muhammad Khurram Khan, Xiong Li:
An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement. Secur. Commun. Networks 7(11): 1921-1932 (2014) - [j6]Saru Kumari, Muhammad Khurram Khan:
More secure smart card-based remote user password authentication scheme with user anonymity. Secur. Commun. Networks 7(11): 2039-2053 (2014) - 2013
- [j5]Muhammad Khurram Khan, Saru Kumari, Pitam Singh:
Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'. KSII Trans. Internet Inf. Syst. 7(5): 967-979 (2013) - 2012
- [j4]Saru Kumari, Mridul Kumar Gupta, Manoj Kumar:
Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card. Central Eur. J. Comput. Sci. 2(1): 60-75 (2012) - [j3]Saru Kumari, Muhammad Khurram Khan, Rahul Kumar:
Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'. J. Medical Syst. 37(4): 9952 (2012) - [j2]Muhammad Khurram Khan, Saru Kumari:
An Authentication Scheme for Secure Access to Healthcare Services. J. Medical Syst. 37(4): 9954 (2012) - 2011
- [j1]Manoj Kumar, Mridul Kumar Gupta, Saru Kumari:
An Improved Efficient Remote Password Authentication Scheme with Smart Card over Insecure Networks. Int. J. Netw. Secur. 13(3): 167-177 (2011)
Conference and Workshop Papers
- 2022
- [c11]Yang Zhao, Zhaozhong Liu, Jingmin An, Guobin Zhu, Saru Kumari:
A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios. ISPEC 2022: 624-639 - 2021
- [c10]Rahul Kumar, Mridul Kumar Gupta, Saru Kumari:
ECC-Based Three-Factor Authentication Scheme For Multi-Server Environment. ISIC 2021: 158-163 - 2017
- [c9]Marimuthu Karuppiah, Akshat Pradhan, Saru Kumari, Ruhul Amin, S. Rajkumar, Rahul Kumar:
Security on "Secure Remote Login Scheme with Password and Smart Card Update Facilities". ICMC 2017: 26-33 - 2014
- [c8]Xiong Li, Junguo Liao, Jiao Zhang, Jianwei Niu, Saru Kumari:
A secure remote user mutual authentication scheme using smart cards. ComComAP 2014: 89-92 - [c7]Muhammad Khurram Khan, Saru Kumari, Xiaomin Wang, Rahul Kumar:
Security Issues of Chen et al.'s Dynamic ID-Based Authentication Scheme. DASC 2014: 125-128 - [c6]Saru Kumari, Muhammad Khurram Khan, Xiong Li, Rahul Kumar:
Notes on "a password-based remote user authentication scheme without smart card". ISBAST 2014: 116-119 - [c5]Xiong Li, Muhammad Khurram Khan, Saru Kumari, Junguo Liao, Wei Liang:
Cryptanalysis of a robust smart card authentication scheme for multi-server architecture. ISBAST 2014: 120-123 - 2013
- [c4]Muhammad Khurram Khan, Saru Kumari, Mridul Kumar Gupta, Fahad Bin Muhaya:
Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device. BICS 2013: 271-277 - [c3]Saru Kumari, Fahad Bin Muhaya, Muhammad Khurram Khan, R. Kumar:
Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme". ISBAST 2013: 247-250 - 2012
- [c2]Muhammad Khurram Khan, Saru Kumari, Mridul Kumar Gupta:
Further cryptanalysis of 'A remote authentication scheme using mobile device'. CASoN 2012: 234-237 - 2011
- [c1]Manoj Kumar, Mridul Kumar Gupta, Saru Kumari:
Cryptanalysis of Enhancements of a Password Authentication Scheme over Insecure Networks. IC3 2011: 524-532
Informal and Other Publications
- 2021
- [i3]Ali Shahidinejad, Mostafa Ghobaei-Arani, Alireza Souri, Mohammad Shojafar, Saru Kumari:
A Technical Report for Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment. CoRR abs/2101.06676 (2021) - [i2]Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari:
\(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol. IACR Cryptol. ePrint Arch. 2021: 144 (2021) - 2020
- [i1]Hu Xiong, Yingzhe Hou, Xin Huang, Saru Kumari:
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things. IACR Cryptol. ePrint Arch. 2020: 1027 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint