Search

Your search keyword '"Shehzad Ashraf Chaudhry"' showing total 164 results

Search Constraints

Start Over You searched for: Author "Shehzad Ashraf Chaudhry" Remove constraint Author: "Shehzad Ashraf Chaudhry"
164 results on '"Shehzad Ashraf Chaudhry"'

Search Results

101. A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment

102. Efficient end-to-end authentication protocol for wearable health monitoring systems

103. A secure mutual authenticated key agreement of user with multiple servers for critical systems

104. An improved anonymous authentication scheme for distributed mobile cloud computing services

105. An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture

106. An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification

107. A privacy preserving authentication scheme for roaming in ubiquitous networks

108. An enhanced lightweight anonymous biometric based authentication scheme for TMIS

109. Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography

110. An enhanced anonymous identity‐based key agreement protocol for smart grid advanced metering infrastructure

111. Symmetric-Key Multi-Factor Biometric Authentication Scheme

112. GCACS-IoD: A certificate based generic access control scheme for Internet of drones

113. A clogging resistant secure authentication scheme for fog computing services

115. A provably secure anonymous authentication scheme for Session Initiation Protocol

116. A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme

117. An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography

118. An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data

119. Comments on 'A privacy preserving three-factor authentication protocol for e-health clouds'

120. An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems

121. A lightweight message authentication scheme for Smart Grid communications in power sector

122. A secure biometric based multi-server authentication scheme for social multimedia networks

123. An improved and robust biometrics-based three factor authentication scheme for multiserver environments

124. A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks

126. Comment on ‘SFVCC: Chaotic map‐based security framework for vehicular cloud computing’

127. A robust authentication and access control protocol for securing wireless healthcare sensor networks

128. Sixth Generation (6G) Wireless Networks: Vision, Research Activities, Challenges and Potential Solutions

129. A provably secure and efficient authenticated key agreement scheme for Energy Internet based Vehicle-to-Grid technology framework

131. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

132. An improved smart card based authentication scheme for session initiation protocol

133. An enhanced privacy preserving remote user authentication scheme with provable security

134. A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography

135. Security Vulnerabilities and Improvements of SPAM: a Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks

136. Comments and improvements of 'HOTA: Handover optimized ticket-based authentication in network-based mobility management'

139. Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key

140. A provable and secure mobile user authentication scheme for mobile cloud computing services

143. A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography

144. An improved Authentication Protocol for SIP-based VoIP

145. An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment

146. A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments

147. An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography

148. Correction: Cryptanalysis and Improvement of 'A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks'

149. An improved lightweight multiserver authentication scheme

150. Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems

Catalog

Books, media, physical & digital resources