Search filters

List of works by Saru Kumari

A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid

scientific article published in 2020

A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments

scientific article published in 2020

A certificateless aggregate signature scheme for healthcare wireless sensor network

article

A password based authentication scheme for wireless multimedia systems

A provably secure and anonymous message authentication scheme for smart grids

A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city

article

A secure and scalable data integrity auditing scheme based on hyperledger fabric

journal article from 'Computers & Security' published in 2020

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

AFFIRM: Provably Forward Privacy for Searchable Encryption in Cooperative Intelligent Transportation System

scientific article published in 2022

Amassing the Security: An Enhanced Authentication and Key Agreement Protocol for Remote Surgery in Healthcare Environment

scientific article published in 2023

An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System

scientific article published on 27 November 2020

An authentication scheme for secure access to healthcare services

scientific article published on 5 July 2013

An improved biometrics-based remote user authentication scheme with user anonymity

scientific article

An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement

scientific article published in 2013

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks

Blockchain-based medical data sharing schedule guaranteeing security of individual entities

scientific article published in 2021

Blockchain-based privacy-preserving authentication protocol for UAV networks

scientific article published in 2023

Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message

scientific article published in 2022

Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen Key Attacks for Industrial Internet of Things

scientific article published in 2021

Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things

scientific article published in 2018

Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks

scientific article published on 24 October 2019

Cryptanalysis and improvement of 'A privacy enhanced scheme for telecare medical information systems'.

scientific article

Cryptanalysis and improvement of Yan et al.'s biometric-based authentication scheme for telecare medicine information systems.

scientific article published in June 2014

Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps

scientific article published in 2014

Cryptanalysis and improvement of an authentication scheme for IoT

scientific article published in 2022

Cryptanalysis and improvement of ‘a robust smart-card-based remote user password authentication scheme’

scientific article published in 2013

Cryptanalysis and security enhancement of Chen et al.’s remote user authentication scheme using smart card

scientific article published in 2012

Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things

scientific article published on 08 June 2022

Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services

scientific article published in 2019

Design of a Secure Password-Based Authentication Scheme for M2M Networks in IoT Enabled Cyber-Physical Systems

scientific article published in 2019

Design of a Secure Three-Factor Authentication Scheme for Smart Healthcare

scientific article published on 03 April 2019

Design of a user anonymous password authentication scheme without smart card

scientific article published in 2014

EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks

Efficient and Privacy-Enhanced Asynchronous Federated Learning for Multimedia Data in Edge-based IoT

scientific article published on 16 August 2024

Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT

scientific article published in 2020

Gateway‐oriented two‐server password authenticated key exchange protocol for unmanned aerial vehicles in mobile edge computing

scientific article published in 2020

Guest editorial: Introduction to the special section on sustainable security solutions for Internet of Vehicles (VSI-iov)

scientific article published in 2022

Heterogeneous Signcryption With Equality Test for IIoT Environment

scientific article published in 2021

More secure smart card-based remote user password authentication scheme with user anonymity

scientific article published in 2013

On the design of a secure user authentication and key agreement scheme for wireless sensor networks

On the security enhancement of integrated electronic patient records information systems

scientific article published in 2015

Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure

Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment

scientific article published in 2017

PoRX: A reputation incentive scheme for blockchain consensus of IIoT

journal article from 'Future Generation Computer Systems' published in 2020

Proof of X-repute blockchain consensus protocol for IoT systems

scientific article published in 2020

Proxy re‐encryption with equality test for secure data sharing in Internet of Things‐based healthcare systems

scientific article published in 2020

Revised anonymous authentication protocol for adaptive client‐server infrastructure

scientific article published on 9 January 2020

SPSR-FSPG: A Fast Simulative Password Set Generation Algorithm

scientific article published in 2019

Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems

scientific article published in 2022

Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications

scientific article published on 12 October 2016

Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems

scientific article published on 29 July 2016

Secure anonymous mutual authentication for star two-tier wireless body area networks.

scientific article published on 15 July 2016

Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks

Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps

Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce

scientific article published on 26 April 2014

Verifiable dynamic ranked search with forward privacy over encrypted cloud data

scientific article published in 2021

Verifier-based anonymous password-authenticated key exchange protocol in the standard model

scientific article published on 01 April 2019