
Saru Kumari
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j161]Vinod Kumar
, Musheer Ahmad, Adesh Kumari, Saru Kumari
, Muhammad Khurram Khan:
SEBAP: A secure and efficient biometric-assisted authentication protocol using ECC for vehicular cloud computing. Int. J. Commun. Syst. 34(2) (2021) - [j160]Afzal Badshah, Anwar Ghani, Azeem Irshad, Husnain Naqvi, Saru Kumari:
Smart workload migration on external cloud service providers to minimize delay, running time, and transfer cost. Int. J. Commun. Syst. 34(3) (2021) - [j159]Insaf Ullah, Noor Ul Amin, Muhammad Asghar Khan
, Hizbullah Khattak, Saru Kumari
:
An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System. J. Medical Syst. 45(1): 4 (2021) - [i2]Ali Shahidinejad, Mostafa Ghobaei-Arani, Alireza Souri, Mohammad Shojafar, Saru Kumari:
A Technical Report for Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment. CoRR abs/2101.06676 (2021) - 2020
- [j158]Tsu-Yang Wu
, Zhiyuan Lee, Mohammad S. Obaidat, Saru Kumari, Sachin Kumar
, Chien-Ming Chen
:
An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks. IEEE Access 8: 28096-28108 (2020) - [j157]Izwa Altaf, Muhammad Asad Saleem
, Khalid Mahmood
, Saru Kumari, Pradeep Chaudhary, Chien-Ming Chen
:
A Lightweight Key Agreement and Authentication Scheme for Satellite-Communication Systems. IEEE Access 8: 46278-46287 (2020) - [j156]Bander A. Alzahrani
, Khalid Mahmood
, Saru Kumari:
Lightweight Authentication Protocol for NFC Based Anti-Counterfeiting System in IoT Infrastructure. IEEE Access 8: 76357-76367 (2020) - [j155]Saddam Hussain
, Insaf Ullah, Hizbullah Khattak, Muhammad Adnan, Saru Kumari, Syed Sajid Ullah
, Muhammad Asghar Khan
, Shah Jahan Khattak:
A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid. IEEE Access 8: 93230-93248 (2020) - [j154]Adesh Kumari, Vinod Kumar
, M. Yahya Abbasi, Saru Kumari, Pradeep Chaudhary, Chien-Ming Chen
:
CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC. IEEE Access 8: 107838-107852 (2020) - [j153]Shafiq Ahmed
, Saru Kumari, Muhammad Asad Saleem
, Kadambri Agarwal, Khalid Mahmood
, Ming-Hour Yang
:
Anonymous Key-Agreement Protocol for V2G Environment Within Social Internet of Vehicles. IEEE Access 8: 119829-119839 (2020) - [j152]Mehdi Hosseinzadeh
, Omed Hassan Ahmed, Sarkar Hasan Ahmed
, Cuong Trinh
, Nasour Bagheri
, Saru Kumari
, Jan Lansky
, Bao Huynh
:
An Enhanced Authentication Protocol for RFID Systems. IEEE Access 8: 126977-126987 (2020) - [j151]Cuong Trinh
, Bao Huynh
, Jan Lansky
, Stanislava Mildeová, Masoumeh Safkhani
, Nasour Bagheri, Saru Kumari
, Mehdi Hosseinzadeh:
A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments. IEEE Access 8: 165536-165550 (2020) - [j150]Masoumeh Safkhani, Nasour Bagheri
, Saru Kumari
, Hamidreza Tavakoli
, Sachin Kumar
, Jiahui Chen
:
RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications. IEEE Access 8: 200851-200862 (2020) - [j149]Fan Wu, Xiong Li
, Lili Xu, Saru Kumari, Dingbao Lin, Joel J. P. C. Rodrigues:
An anonymous and identity-trackable data transmission scheme for smart grid under smart city notion. Ann. des Télécommunications 75(7-8): 307-317 (2020) - [j148]Hongfeng Zhu, Xueying Wang, Chien-Ming Chen, Saru Kumari:
Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain. Comput. Electr. Eng. 86: 106714 (2020) - [j147]Eric Ke Wang, Chien-Ming Chen
, Fan Wang, Muhammad Khurram Khan, Saru Kumari:
Joint-learning segmentation in Internet of drones (IoD)-based monitor systems. Comput. Commun. 152: 54-62 (2020) - [j146]Fan Wu, Xiong Li, Lili Xu, Saru Kumari:
A privacy-preserving scheme with identity traceable property for smart grid. Comput. Commun. 157: 38-44 (2020) - [j145]Ning Lu, Yongxin Zhang, Wenbo Shi, Saru Kumari
, Kim-Kwang Raymond Choo
:
A secure and scalable data integrity auditing scheme based on hyperledger fabric. Comput. Secur. 92: 101741 (2020) - [j144]Eric Ke Wang
, RuiPei Sun, Chien-Ming Chen, Zuodong Liang, Saru Kumari
, Muhammad Khurram Khan
:
Proof of X-repute blockchain consensus protocol for IoT systems. Comput. Secur. 95: 101871 (2020) - [j143]Yanan Zhao, Yingzhe Hou, Lili Wang, Saru Kumari
, Muhammad Khurram Khan, Hu Xiong:
An efficient certificateless aggregate signature scheme for the Internet of Vehicles. Trans. Emerg. Telecommun. Technol. 31(5) (2020) - [j142]Muhammad Asad Saleem
, Shafiq Ahmed
, Khalid Mahmood, Saru Kumari, Hu Xiong:
An enhanced authentication protocol for client server environment. Frontiers Comput. Sci. 14(6): 146810 (2020) - [j141]Eric Ke Wang, Zuodong Liang, Chien-Ming Chen
, Saru Kumari, Muhammad Khurram Khan:
PoRX: A reputation incentive scheme for blockchain consensus of IIoT. Future Gener. Comput. Syst. 102: 140-151 (2020) - [j140]Muhammad Arslan Akram, Zahid Ghaffar, Khalid Mahmood, Saru Kumari, Kadambri Agarwal, Chien-Ming Chen:
An anonymous authenticated key-agreement scheme for multi-server infrastructure. Hum. centric Comput. Inf. Sci. 10: 22 (2020) - [j139]Hui Zhang, Saru Kumari, Mohammad S. Obaidat, FushanS. Wei:
Gateway-oriented two-server password authenticated key exchange protocol for unmanned aerial vehicles in mobile edge computing. IET Commun. 14(15): 2427-2433 (2020) - [j138]Saru Kumari
, Km. Renuka
:
A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs. Int. J. Commun. Syst. 33(3) (2020) - [j137]Khalid Mahmood
, Aniqa Rehman
, Pradeep Chaudhary, Xiong Li, Fan Wu, Saru Kumari
:
Revised anonymous authentication protocol for adaptive client-server infrastructure. Int. J. Commun. Syst. 33(4) (2020) - [j136]Muhammad Naeem, Shehzad Ashraf Chaudhry
, Khalid Mahmood, Marimuthu Karuppiah
, Saru Kumari
:
A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things. Int. J. Commun. Syst. 33(13) (2020) - [j135]Zijian Bao, Wenbo Shi, Saru Kumari, Zhiyin Kong, Chien-Ming Chen
:
Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity. Int. J. Inf. Sec. 19(3): 311-321 (2020) - [j134]Muhammad Asad Saleem
, Khalid Mahmood
, Saru Kumari
:
Comments on "AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment". IEEE Internet Things J. 7(5): 4671-4675 (2020) - [j133]Muhammad Arslan Akram
, Khalid Mahmood
, Saru Kumari
, Hu Xiong
:
Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0". IEEE Internet Things J. 7(5): 4676-4681 (2020) - [j132]Hu Xiong, Yan Wu, Chuanjie Jin, Saru Kumari:
Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT. IEEE Internet Things J. 7(12): 11713-11724 (2020) - [j131]Mahdi Nikooghadam, Haleh Amintoosi, Saru Kumari:
A provably secure ECC-based roaming authentication scheme for global mobility networks. J. Inf. Secur. Appl. 54: 102588 (2020) - [j130]Akasha Shafiq, Muhammad Faizan Ayub, Khalid Mahmood, Mazhar Sadiq, Saru Kumari, Chien-Ming Chen
:
An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure. J. Sensors 2020: 8829319:1-8829319:17 (2020) - [j129]R. Shashidhara, Sriramulu Bojjagani
, Anup Kumar Maurya, Saru Kumari
, Hu Xiong:
A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments. Peer Peer Netw. Appl. 13(6): 1943-1966 (2020) - [j128]Rubi Arya, Pitam Singh, Saru Kumari, Mohammad S. Obaidat:
An approach for solving fully fuzzy multi-objective linear fractional optimization problems. Soft Comput. 24(12): 9105-9119 (2020) - [j127]Vinod Kumar
, Musheer Ahmad, Dheerendra Mishra
, Saru Kumari
, Muhammad Khurram Khan:
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing. Veh. Commun. 22: 100213 (2020) - [j126]Salman Shamshad
, Khalid Mahmood
, Saru Kumari
:
Comments on "A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things". Wirel. Pers. Commun. 112(1): 463-466 (2020) - [i1]Hu Xiong, Yingzhe Hou, Xin Huang, Saru Kumari:
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things. IACR Cryptol. ePrint Arch. 2020: 1027 (2020)
2010 – 2019
- 2019
- [j125]Saru Kumari, Pradeep Chaudhary, Chien-Ming Chen
, Muhammad Khurram Khan:
Questioning Key Compromise Attack on Ostad-Sharif et al.'s Authentication and Session key Generation Scheme for Healthcare Applications. IEEE Access 7: 39717-39720 (2019) - [j124]Km. Renuka, Saru Kumari, Dongning Zhao, Li Li
:
Design of a Secure Password-Based Authentication Scheme for M2M Networks in IoT Enabled Cyber-Physical Systems. IEEE Access 7: 51014-51027 (2019) - [j123]Mengli Zhang
, Gang Zhou, Muhammad Khurram Khan
, Saru Kumari, Xuexian Hu, Wenfen Liu:
SPSR-FSPG: A Fast Simulative Password Set Generation Algorithm. IEEE Access 7: 155107-155119 (2019) - [j122]Marko Kompara, Saru Kumari, Marko Hölbl
:
Analysis and improvement of a secure key management protocol for e-health applications. Comput. Electr. Eng. 73: 97-113 (2019) - [j121]Imran Ashraf
, Soojung Hur, Muhammad Shafiq
, Saru Kumari
, Yongwan Park:
GUIDE: Smartphone sensors-based pedestrian indoor localization with heterogeneous devices. Int. J. Commun. Syst. 32(15) (2019) - [j120]Khalid Mahmood
, Jehangir Arshad, Shehzad Ashraf Chaudhry
, Saru Kumari
:
An enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure. Int. J. Commun. Syst. 32(16) (2019) - [j119]Xiong Li
, Shanpeng Liu, Fan Wu
, Saru Kumari
, Joel J. P. C. Rodrigues
:
Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications. IEEE Internet Things J. 6(3): 4755-4763 (2019) - [j118]Majid Bayat, Zahra Zare Jousheghani, Ashok Kumar Das, Pitam Singh, Saru Kumari, Mohammad Reza Aref:
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications. ISC Int. J. Inf. Secur. 11(2): 113-128 (2019) - [j117]Jangirala Srinivas, Dheerendra Mishra
, Sourav Mukhopadhyay, Saru Kumari, Vandana Guleria:
An Authentication Framework for Roaming Service in Global Mobility Networks. Inf. Technol. Control. 48(1): 129-145 (2019) - [j116]Azeem Irshad, Shehzad Ashraf Chaudhry
, Muhammad Shafiq, Muhammad Usman, Muhammad Asif, Saru Kumari:
An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol. Inf. Technol. Control. 48(2): 211-224 (2019) - [j115]Jiaqi Wang, Marimuthu Karuppiah
, Saru Kumari, Zhiyin Kong, Wenbo Shi:
A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification. J. Intell. Fuzzy Syst. 36(5): 4215-4226 (2019) - [j114]Km. Renuka, Saru Kumari, Xiong Li
:
Design of a Secure Three-Factor Authentication Scheme for Smart Healthcare. J. Medical Syst. 43(5): 133:1-133:12 (2019) - [j113]JiLiang Li
, WeiGuo Zhang, Vivek Dabra, Kim-Kwang Raymond Choo
, Saru Kumari, Dieter Hogrefe:
AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities. J. Netw. Comput. Appl. 134: 52-61 (2019) - [j112]Xiong Li
, Fan Wu
, Saru Kumari, Lili Xu, Arun Kumar Sangaiah
, Kim-Kwang Raymond Choo
:
A provably secure and anonymous message authentication scheme for smart grids. J. Parallel Distributed Comput. 132: 242-249 (2019) - [j111]Marimuthu Karuppiah
, Ashok Kumar Das, Xiong Li
, Saru Kumari, Fan Wu, Shehzad Ashraf Chaudhry
, Niranchana Radhakrishnan:
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment. Mob. Networks Appl. 24(3): 1046-1062 (2019) - [j110]Pitam Singh, Ashish Kumar Singh, Priyamvada Singh, Saru Kumari, Arun Kumar Sangaiah
:
Multimodal data modeling for efficiency assessment of social priority based urban bus route transportation system using GIS and data envelopment analysis. Multim. Tools Appl. 78(17): 23897-23915 (2019) - [j109]Km. Renuka, Sachin Kumar
, Saru Kumari, Chien-Ming Chen
:
Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks. Sensors 19(21): 4625 (2019) - [j108]Azeem Irshad
, Shehzad Ashraf Chaudhry
, Muhammad Sher, Bander A. Alzahrani
, Saru Kumari
, Xiong Li
, Fan Wu
:
An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre. IEEE Syst. J. 13(1): 436-446 (2019) - [j107]Fan Wu
, Lili Xu, Xiong Li
, Saru Kumari
, Marimuthu Karuppiah
, Mohammad S. Obaidat
:
A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography. IEEE Syst. J. 13(3): 2830-2838 (2019) - [j106]Deepika Agarwal, Pitam Singh, Deepak Bhati, Saru Kumari, Mohammad S. Obaidat:
Duality-based branch-bound computational algorithm for sum-of-linear-fractional multi-objective optimization problem. Soft Comput. 23(1): 197-210 (2019) - [j105]Deepika Agarwal, Pitam Singh, Xiong Li
, Saru Kumari:
Optimality criteria for fuzzy-valued fractional multi-objective optimization problem. Soft Comput. 23(19): 9049-9067 (2019) - [j104]Pankaj Kumar Sa, Saru Kumari, Vishnu Sharma, Xiong Li
, Arun Kumar Sangaiah
, SK Hafizul Islam:
Secure CLS and CL-AS schemes designed for VANETs. J. Supercomput. 75(6): 3076-3098 (2019) - 2018
- [j103]Marimuthu Karuppiah
, Xiong Li
, Ashok Kumar Das, Saru Kumari, Qin Liu:
Introduction to the special section on Big data and IoT in e-healthcare. Comput. Electr. Eng. 65: 261-264 (2018) - [j102]Fan Wu, Xiong Li
, Lili Xu, Saru Kumari, Arun Kumar Sangaiah
:
A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput. Electr. Eng. 68: 107-118 (2018) - [j101]Sravani Challa, Ashok Kumar Das
, Vanga Odelu
, Neeraj Kumar
, Saru Kumari, Muhammad Khurram Khan, Athanasios V. Vasilakos:
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput. Electr. Eng. 69: 534-554 (2018) - [j100]Marimuthu Karuppiah
, Xiong Li
, Ashok Kumar Das, Saru Kumari, Qin Liu:
Introduction to the special section on Big data and IoT in e-healthcare. Comput. Electr. Eng. 70: 1092-1095 (2018) - [j99]Javad Khodadoust
, Ali Mohammad Khodadoust, Xiong Li
, Saru Kumari:
Design and implementation of a multibiometric system based on hand's traits. Expert Syst. Appl. 97: 303-314 (2018) - [j98]JiLiang Li
, WeiGuo Zhang
, Saru Kumari, Kim-Kwang Raymond Choo
, Dieter Hogrefe:
Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps. Trans. Emerg. Telecommun. Technol. 29(6) (2018) - [j97]Khalid Mahmood, Shehzad Ashraf Chaudhry
, Husnain Naqvi, Saru Kumari, Xiong Li
, Arun Kumar Sangaiah
:
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Gener. Comput. Syst. 81: 557-565 (2018) - [j96]Fan Wu, Xiong Li
, Arun Kumar Sangaiah
, Lili Xu, Saru Kumari, Liuxi Wu, Jian Shen:
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Gener. Comput. Syst. 82: 727-737 (2018) - [j95]Xiong Li
, Jianwei Niu
, Saru Kumari, Fan Wu, Kim-Kwang Raymond Choo
:
A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city. Future Gener. Comput. Syst. 83: 607-618 (2018) - [j94]Rifaqat Ali
, Arup Kumar Pal, Saru Kumari, Marimuthu Karuppiah
, Mauro Conti:
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Future Gener. Comput. Syst. 84: 200-215 (2018) - [j93]Khalid Mahmood, Xiong Li
, Shehzad Ashraf Chaudhry
, Husnain Naqvi, Saru Kumari, Arun Kumar Sangaiah
, Joel J. P. C. Rodrigues
:
Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure. Future Gener. Comput. Syst. 88: 491-500 (2018) - [j92]Sandip Roy, Santanu Chatterjee, Ashok Kumar Das
, Samiran Chattopadhyay, Saru Kumari, Minho Jo
:
Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things. IEEE Internet Things J. 5(4): 2884-2895 (2018) - [j91]Wenfen Liu, Gang Zhou, Jianghong Wei
, Xuexian Hu, Saru Kumari:
Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks. Inf. Technol. Control. 47(2): 275-294 (2018) - [j90]Azeem Irshad, Muhammad Sher, Bander A. Alzahrani, Aiiad Albeshri, Shehzad Ashraf Chaudhry
, Saru Kumari:
Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al. KSII Trans. Internet Inf. Syst. 12(1): 523-549 (2018) - [j89]Saru Kumari, Marimuthu Karuppiah
, Ashok Kumar Das, Xiong Li
, Fan Wu, Vidushi Gupta:
Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography. J. Ambient Intell. Humaniz. Comput. 9(3): 643-653 (2018) - [j88]Jangirala Srinivas
, Dheerendra Mishra
, Sourav Mukhopadhyay, Saru Kumari:
Provably secure biometric based authentication and key agreement protocol for wireless sensor networks. J. Ambient Intell. Humaniz. Comput. 9(4): 875-895 (2018) - [j87]Fan Wu
, Lili Xu, Saru Kumari, Xiong Li
, Ashok Kumar Das, Jian Shen:
A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. J. Ambient Intell. Humaniz. Comput. 9(4): 919-930 (2018) - [j86]Xiong Li
, Jianwei Niu, Saru Kumari, Fan Wu, Arun Kumar Sangaiah
, Kim-Kwang Raymond Choo
:
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl. 103: 194-204 (2018) - [j85]Azeem Irshad
, Muhammad Sher, Shehzad Ashraf Chaudhry
, Qi Xie, Saru Kumari, Fan Wu:
An improved and secure chaotic map based authenticated key agreement in multi-server architecture. Multim. Tools Appl. 77(1): 1167-1204 (2018) - [j84]Saru Kumari, Ashok Kumar Das, Xiong Li
, Fan Wu, Muhammad Khurram Khan, Qi Jiang, SK Hafizul Islam:
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments. Multim. Tools Appl. 77(2): 2359-2389 (2018) - [j83]Azeem Irshad
, Muhammad Sher, Shehzad Ashraf Chaudhry
, Saru Kumari, Arun Kumar Sangaiah
, Xiong Li
, Fan Wu:
A secure mutual authenticated key agreement of user with multiple servers for critical systems. Multim. Tools Appl. 77(9): 11067-11099 (2018) - [j82]Fan Wu, Lili Xu, Saru Kumari, Xiong Li
:
An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer Peer Netw. Appl. 11(1): 1-20 (2018) - [j81]Pankaj Kumar Sa, Saru Kumari, Vishnu Sharma, Arun Kumar Sangaiah
, Jianghong Wei
, Xiong Li
:
A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustain. Comput. Informatics Syst. 18: 80-89 (2018) - [j80]Xiong Li
, Maged Hamada Ibrahim, Saru Kumari, Rahul Kumar:
Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors. Telecommun. Syst. 67(2): 323-348 (2018) - [j79]Xiong Li
, Jianwei Niu
, Md. Zakirul Alam Bhuiyan
, Fan Wu
, Marimuthu Karuppiah
, Saru Kumari:
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(8): 3599-3609 (2018) - [j78]Azeem Irshad
, Husnain Naqvi, Shehzad Ashraf Chaudhry
, Shouket Raheem, Saru Kumari, Ambrina Kanwal, Muhammad Usman:
An efficient and secure design of multi-server authenticated key agreement protocol. J. Supercomput. 74(9): 4771-4797 (2018) - [j77]Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, Vanga Odelu
:
Attribute-based authentication on the cloud for thin clients. J. Supercomput. 74(11): 5813-5845 (2018) - [j76]Saru Kumari, Marimuthu Karuppiah
, Ashok Kumar Das
, Xiong Li
, Fan Wu, Neeraj Kumar
:
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J. Supercomput. 74(12): 6428-6453 (2018) - [j75]JiLiang Li
, Kim-Kwang Raymond Choo
, WeiGuo Zhang, Saru Kumari, Joel J. P. C. Rodrigues
, Muhammad Khurram Khan, Dieter Hogrefe:
EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Veh. Commun. 13: 104-113 (2018) - 2017
- [j74]Fan Wu, Lili Xu, Saru Kumari, Xiong Li
, Muhammad Khurram Khan, Ashok Kumar Das:
An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann. des Télécommunications 72(3-4): 131-144 (2017) - [j73]Xiong Li
, Jieyao Peng, Saru Kumari, Fan Wu, Marimuthu Karuppiah
, Kim-Kwang Raymond Choo
:
An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Comput. Electr. Eng. 61: 238-249 (2017) - [j72]Fan Wu, Xiong Li
, Lili Xu, Saru Kumari, Marimuthu Karuppiah
, Jian Shen:
A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server. Comput. Electr. Eng. 63: 168-181 (2017) - [j71]Xiong Li
, Maged Hamada Ibrahim, Saru Kumari, Arun Kumar Sangaiah
, Vidushi Gupta, Kim-Kwang Raymond Choo
:
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput. Networks 129: 429-443 (2017) - [j70]Saru Kumari, Ashok Kumar Das, Mohammad Wazid
, Xiong Li
, Fan Wu, Kim-Kwang Raymond Choo
, Muhammad Khurram Khan:
On the design of a secure user authentication and key agreement scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j69]Vanga Odelu
, Ashok Kumar Das, Y. Sreenivasa Rao, Saru Kumari, Muhammad Khurram Khan, Kim-Kwang Raymond Choo
:
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput. Stand. Interfaces 54: 3-9 (2017) - [j68]Vanga Odelu
, Ashok Kumar Das
, Saru Kumari, Xinyi Huang, Mohammad Wazid
:
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Gener. Comput. Syst. 68: 74-88 (2017) - [j67]Saru Kumari, Xiong Li
, Fan Wu, Ashok Kumar Das, Kim-Kwang Raymond Choo
, Jian Shen:
Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Gener. Comput. Syst. 68: 320-330 (2017) - [j66]Mohammad Sabzinejad Farash
, Mahmoud Ahmadian-Attari, Saru Kumari:
Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Int. J. Commun. Syst. 30(1) (2017) - [j65]Dheerendra Mishra
, Saru Kumari, Muhammad Khurram Khan, Sourav Mukhopadhyay:
An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems. Int. J. Commun. Syst. 30(1) (2017) - [j64]Mohammad Sabzinejad Farash
, Shehzad Ashraf Chaudhry
, Mohammad Heydari, Seyed Mohammad Sajad Sadough
, Saru Kumari, Muhammad Khurram Khan:
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst. 30(4) (2017) - [j63]Azeem Irshad
, Shehzad Ashraf Chaudhry
, Saru Kumari
, Muhammad Usman, Khalid Mahmood, Muhammad Shahzad Faisal:
An improved lightweight multiserver authentication scheme. Int. J. Commun. Syst. 30(17) (2017) - [j62]Rajkumar Soundrapandiyan, Marimuthu Karuppiah
, Saru Kumari, Sanjay Kumar Tyagi
, Fan Wu, Ki-Hyun Jung:
An Efficient DWT and Intuitionistic Fuzzy Based Multimodality Medical Image Fusion. Int. J. Imaging Syst. Technol. 27(2): 118-132 (2017) - [j61]Fan Wu, Lili Xu, Saru Kumari, Xiong Li
:
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. J. Ambient Intell. Humaniz. Comput. 8(1): 101-116 (2017) - [j60]SK Hafizul Islam, Ruhul Amin, G. P. Biswas, Mohammad Sabzinejad Farash
, Xiong Li
, Saru Kumari:
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. J. King Saud Univ. Comput. Inf. Sci. 29(3): 311-324 (2017) - [j59]Fan Wu, Lili Xu, Saru Kumari, Xiong Li
, Jian Shen, Kim-Kwang Raymond Choo
, Mohammad Wazid
, Ashok Kumar Das:
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 89: 72-85 (2017) - [j58]Fan Wu, Lili Xu, Saru Kumari, Xiong Li
:
An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multim. Syst. 23(2): 195-205 (2017) - [j57]Saru Kumari:
Design flaws of "an anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography". Multim. Tools Appl. 76(11): 13581-13583 (2017) - [j56]Azeem Irshad
, Muhammad Sher, Omer Nawaz, Shehzad Ashraf Chaudhry
, Imran Khan, Saru Kumari:
A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme. Multim. Tools Appl. 76(15): 16463-16489 (2017) - [j55]Nishant Doshi
, Saru Kumari, Dheerendra Mishra
, Xiong Li
, Kim-Kwang Raymond Choo
, Arun Kumar Sangaiah
:
A password based authentication scheme for wireless multimedia systems. Multim. Tools Appl. 76(24): 25893-25918 (2017) - [j54]