default search action
Ashok Kumar Das
Person information
- affiliation: International Institute of Information Technology (IIIT), Center for Security, Theory and Algorithmic Research, Hyderabad, India
- affiliation (2022, 2024): Old Dominion University, Suffolk, VA 23435, USA
- affiliation (2008-2010): International Institute of Information Technology, Bhubaneswar, India, Department of Computer Science and Engineering
- affiliation (PhD, 2008): Indian Institute of Technology Kharagpur, India, Department of Computer Science and Engineering
- affiliation (2000-2004): Centre for Development of Telematics (C-DOT), New Delhi, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j343]Sunil Prajapat, Neeraj Kumar, Ashok Kumar Das, Pankaj Kumar, Rifaqat Ali:
Quantum-safe blockchain-assisted data encryption protocol for internet of things networks. Clust. Comput. 28(1): 5 (2025) - [j342]Sunil Prajapat, Garima Thakur, Pankaj Kumar, Ashok Kumar Das, M. Shamim Hossain:
A blockchain-assisted privacy-preserving signature scheme using quantum teleportation for metaverse environment in Web 3.0. Future Gener. Comput. Syst. 164: 107581 (2025) - 2024
- [j341]Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain:
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security. IEEE Access 12: 14647-14658 (2024) - [j340]Pankaj Kumar, Vivek Bharmaik, Sunil Prajapat, Garima Thakur, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues:
A Secure and Privacy-Preserving Signature Protocol Using Quantum Teleportation in Metaverse Environment. IEEE Access 12: 96718-96728 (2024) - [j339]Ali Raza, Shafiq Ur Rehman Khan, Raja Sher Afgun Usmani, Ashok Kumar Das, Shehzad Ashraf Chaudhry:
A Novel Temporal Footprints-Based Framework for Fake News Detection. IEEE Access 12: 172419-172428 (2024) - [j338]Girraj Kumar Verma, Vinay Chamola, Neeraj Kumar, Ashok Kumar Das, Dheerendra Mishra:
Efficient and secure signcryption-based data aggregation for Internet of Drone-based drone-to-ground station communication. Ad Hoc Networks 159: 103502 (2024) - [j337]Sunil Prajapat, Aryan Rana, Pankaj Kumar, Ashok Kumar Das:
Quantum safe lightweight encryption scheme for secure data sharing in Internet of Nano Things. Comput. Electr. Eng. 117: 109253 (2024) - [j336]Siddhant Thapliyal, Mohammad Wazid, Devesh Pratap Singh, Ramji Chauhan, Amit Kumar Mishra, Ashok Kumar Das:
Secure Artificial Intelligence of Things (AIoT)-enabled authenticated key agreement technique for smart living environment. Comput. Electr. Eng. 118: 109353 (2024) - [j335]Prakash Tekchandani, Ashok Kumar Das, Neeraj Kumar:
Large-scale secure model learning and inference using synthetic data for IoT-based big data analytics. Comput. Electr. Eng. 119: 109565 (2024) - [j334]Deepika Gautam, Sunil Prajapat, Pankaj Kumar, Ashok Kumar Das, Korhan Cengiz, Willy Susilo:
Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage. Clust. Comput. 27(6): 8159-8172 (2024) - [j333]Syed Muhammad Awais, Wu Yucheng, Khalid Mahmood, Hafiz Muhammad Sanaullah Badar, Rupak Kharel, Ashok Kumar Das:
Provably secure fog-based authentication protocol for VANETs. Comput. Networks 246: 110391 (2024) - [j332]Mohd Shariq, Mauro Conti, Karan Singh, Chhagan Lal, Ashok Kumar Das, Shehzad Ashraf Chaudhry, Mehedi Masud:
Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing. Comput. Networks 252: 110678 (2024) - [j331]Raveendra Babu Ponnuru, Sathish A. P. Kumar, Alavalapati Goutham Reddy, Ashok Kumar Das:
Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges. Comput. Sci. Rev. 54: 100676 (2024) - [j330]Mohammad Wazid, Amit Kumar Mishra, Noor Mohd, Ashok Kumar Das:
A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact. Cyber Secur. Appl. 2: 100040 (2024) - [j329]Ashok Kumar Das, Rajkamal Sahu:
A characterization of unit interval bigraphs of open and closed intervals. Discret. Appl. Math. 342: 231-243 (2024) - [j328]Sandip Roy, Abhishek Bisht, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain:
Age of correlated information-optimal dynamic policy scheduling for sustainable Green IoT devices: A multi-agent deep reinforcement learning approach. Internet Things 26: 101141 (2024) - [j327]Khalid Mahmood, Muhammad Asad Saleem, Zahid Ghaffar, Salman Shamshad, Ashok Kumar Das, Mohammed J. F. Alenazi:
Robust and efficient three-factor authentication solution for WSN-based industrial IoT deployment. Internet Things 28: 101372 (2024) - [j326]Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Ashok Kumar Das, Biplab Sikdar:
Quantum Secure Threshold Private Set Intersection Protocol for IoT-Enabled Privacy-Preserving Ride-Sharing Application. IEEE Internet Things J. 11(1): 1761-1772 (2024) - [j325]Chien-Ming Chen, Zhaoting Chen, Ashok Kumar Das, Shehzad Ashraf Chaudhry:
A Security-Enhanced and Ultralightweight Communication Protocol for Internet of Medical Things. IEEE Internet Things J. 11(6): 10168-10182 (2024) - [j324]Khalid Mahmood, Zahid Ghaffar, Muhammad Farooq, Khalid Yahya, Ashok Kumar Das, Shehzad Ashraf Chaudhry:
A Security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones. IEEE Internet Things J. 11(12): 22301-22309 (2024) - [j323]Sunil Prajapat, Pankaj Kumar, Dheeraj Kumar, Ashok Kumar Das, M. Shamim Hossain, Joel J. P. C. Rodrigues:
Quantum Secure Authentication Scheme for Internet of Medical Things Using Blockchain. IEEE Internet Things J. 11(23): 38496-38507 (2024) - [j322]Patruni Muralidhara Rao, Saraswathi Pedada, Srinivas Jangirala, Ashok Kumar Das, Joel J. P. C. Rodrigues:
Role of IoT in the Ages of Digital to Smart Cities: Security Challenges and Countermeasures. IEEE Internet Things Mag. 7(1): 56-64 (2024) - [j321]Abhishek Kumar Pandey, Ashok Kumar Das, Rajeev Kumar, Joel J. P. C. Rodrigues:
Secure Cyber Engineering for IoT-Enabled Smart Healthcare System. IEEE Internet Things Mag. 7(2): 70-77 (2024) - [j320]Patruni Muralidhara Rao, Anusha Vangala, Saraswathi Pedada, Ashok Kumar Das, Athanasios V. Vasilakos:
Privacy-Preserving Lightweight Authentication for Location-Aware Edge-Enabled eHealth Systems. IEEE Internet Things Mag. 7(3): 76-82 (2024) - [j319]Mohammad Wazid, Ashok Kumar Das, Youngho Park:
Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future Research. IEEE Open J. Comput. Soc. 5: 248-267 (2024) - [j318]Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, Mou Dasgupta, Ashok Kumar Das, Youngho Park:
ECC-PDGPP: ECC-Based Parallel Dependency RFID-Grouping-Proof Protocol Using Zero-Knowledge Property in the Internet of Things Environment. IEEE Open J. Comput. Soc. 5: 329-342 (2024) - [j317]Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, Mou Dasgupta, Ashok Kumar Das, Youngho Park:
ECC-EXONUM-eVOTING: A Novel Signature-Based e-Voting Scheme Using Blockchain and Zero Knowledge Property. IEEE Open J. Commun. Soc. 5: 583-598 (2024) - [j316]Amina Zahoor, Khalid Mahmood, Muhammad Asad Saleem, Hafiz Muhammad Sanaullah Badar, Tuan-Vinh Le, Ashok Kumar Das:
Lightweight Authenticated Key Agreement Protocol for Smart Power Grid Systems Using PUF. IEEE Open J. Commun. Soc. 5: 3568-3580 (2024) - [j315]Garima Thakur, Deepika Gautam, Pankaj Kumar, Ashok Kumar Das, Vivekananda Bhat K., Joel J. P. C. Rodrigues:
Blockchain-Assisted Cross-Platform Authentication Protocol With Conditional Traceability for Metaverse Environment in Web 3.0. IEEE Open J. Commun. Soc. 5: 7244-7261 (2024) - [j314]Abhishek Bisht, Ashok Kumar Das, Debasis Giri:
Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey. Secur. Priv. 7(2) (2024) - [j313]Vijay Karnatak, Amit Kumar Mishra, Neha Tripathi, Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das:
A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications. Secur. Priv. 7(2) (2024) - [j312]Anusha Vangala, Ashok Kumar Das, Neeraj Kumar, Pandi Vijayakumar, Marimuthu Karuppiah, Youngho Park:
Designing access control security protocol for Industry 4.0 using Blockchain-as-a-Service. Secur. Priv. 7(2) (2024) - [j311]Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues:
An Ensemble-Based Machine Learning-Envisioned Intrusion Detection in Industry 5.0-Driven Healthcare Applications. IEEE Trans. Consumer Electron. 70(1): 1903-1912 (2024) - [j310]Sivaranjani Reddi, Patruni Muralidhara Rao, Saraswathi Pedada, Srinivas Jangirala, Ashok Kumar Das, Sajjad Shaukat Jamal, Youngho Park:
Privacy-Preserving Electronic Medical Record Sharing for IoT-Enabled Healthcare System Using Fully Homomorphic Encryption, IOTA, and Masked Authenticated Messaging. IEEE Trans. Ind. Informatics 20(9): 10802-10813 (2024) - [j309]Sanjeev Kumar Dwivedi, Ruhul Amin, Satyanarayana Vollala, Ashok Kumar Das:
Design of Blockchain and ECC-Based Robust and Efficient Batch Authentication Protocol for Vehicular Ad-Hoc Networks. IEEE Trans. Intell. Transp. Syst. 25(1): 275-288 (2024) - [j308]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty:
An Authentication and Key Management Framework for Secure and Intelligent Transportation of Internet of Space Things. IEEE Trans. Intell. Transp. Syst. 25(6): 5242-5257 (2024) - [j307]Muhammad Asad Saleem, Xiong Li, Khalid Mahmood, Tayyaba Tariq, Mohammed J. F. Alenazi, Ashok Kumar Das:
Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment. IEEE Trans. Intell. Transp. Syst. 25(9): 12528-12537 (2024) - [j306]Muhammad Asad Saleem, Xiong Li, Khalid Mahmood, Salman Shamshad, Mohammed J. F. Alenazi, Ashok Kumar Das:
A Cost-Efficient Anonymous Authenticated and Key Agreement Scheme for V2I-Based Vehicular Ad-Hoc Networks. IEEE Trans. Intell. Transp. Syst. 25(9): 12621-12630 (2024) - [j305]Deepika Gautam, Garima Thakur, Pankaj Kumar, Ashok Kumar Das, Youngho Park:
Blockchain Assisted Intra-Twin and Inter-Twin Authentication Scheme for Vehicular Digital Twin System. IEEE Trans. Intell. Transp. Syst. 25(10): 15002-15015 (2024) - [j304]Deok Kyu Kwon, Seunghwan Son, MyeongHyun Kim, JoonYoung Lee, Ashok Kumar Das, Youngho Park:
A Secure Self-Certified Broadcast Authentication Protocol for Intelligent Transportation Systems in UAV-Assisted Mobile Edge Computing Environments. IEEE Trans. Intell. Transp. Syst. 25(11): 19004-19017 (2024) - [j303]Amit Kumar Mishra, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sandip Roy, Sachin Shetty:
ACKS-IA: An Access Control and Key Agreement Scheme for Securing Industry 4.0 Applications. IEEE Trans. Netw. Sci. Eng. 11(1): 254-269 (2024) - [j302]Sandip Roy, Sourav Nandi, Raj Maheshwari, Sachin Shetty, Ashok Kumar Das, Pascal Lorenz:
Blockchain-Based Efficient Access Control With Handover Policy in IoV-Enabled Intelligent Transportation System. IEEE Trans. Veh. Technol. 73(3): 3009-3024 (2024) - [j301]Syed Muhammad Awais, Yucheng Wu, Khalid Mahmood, Muhammad Wahid Akram, Shafiq Hussain, Ashok Kumar Das, Youngho Park:
PUF-Based Privacy-Preserving Simultaneous Authentication Among Multiple Vehicles in VANET. IEEE Trans. Veh. Technol. 73(5): 6727-6739 (2024) - [j300]Basudeb Bera, Abhishek Bisht, Ashok Kumar Das, Bharat K. Bhargava, David K. Y. Yau, Pascal Lorenz, Biplab Sikdar:
BioKA-ASVN: Biometric-Based Key Agreement Scheme for Air Smart Vehicular Networks Using Blockchain Service. IEEE Trans. Veh. Technol. 73(7): 9478-9494 (2024) - [j299]Muhammad Tanveer, Abdallah Aldosary, Salah-Ud-Din Khokhar, Ashok Kumar Das, Saud Alhajaj Aldossari, Shehzad Ashraf Chaudhry:
PAF-IoD: PUF-Enabled Authentication Framework for the Internet of Drones. IEEE Trans. Veh. Technol. 73(7): 9560-9574 (2024) - [j298]Anusha Vangala, Saurabh Agrawal, Ashok Kumar Das, Shantanu Pal, Neeraj Kumar, Pascal Lorenz, Youngho Park:
Big Data-Enabled Authentication Framework for Offshore Maritime Communication Using Drones. IEEE Trans. Veh. Technol. 73(7): 10196-10210 (2024) - [j297]Sunil Prajapat, Deepika Gautam, Pankaj Kumar, Srinivas Jangirala, Ashok Kumar Das, Youngho Park, Pascal Lorenz:
Secure Lattice-Based Aggregate Signature Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 73(9): 12370-12384 (2024) - [j296]Chien-Ming Chen, Zhen Li, Ashok Kumar Das, Shehzad Ashraf Chaudhry, Pascal Lorenz:
Provably Secure Authentication Scheme for Fog Computing-Enabled Intelligent Social Internet of Vehicles. IEEE Trans. Veh. Technol. 73(9): 13600-13610 (2024) - [c44]Pragya Bhatt, Mohammad S. Obaidat, Gagan Dangwal, Ashok Kumar Das, Mohammad Wazid, Balqies Sadoun:
Machine Learning-Based Security Mechanism for Detecting Phishing Attacks. CCCI 2024: 1-6 - [c43]Saurabh Agrawal, Anusha Vangala, Ashok Kumar Das, Neeraj Kumar, Sachin Shetty, Sajal K. Das:
Secure Location-based Authenticated Key Establishment Scheme for Maritime Communication. ICC 2024: 1927-1932 - [c42]Sourav Saha, Ashok Kumar Das, Saksham Mittal, Mohammad Wazid:
Designing Secure Big Data Analytics Mechanism Using Authentication for Drones-Assisted Military Applications. INFOCOM (Workshops) 2024: 1-6 - [c41]Anusha Vangala, Ashok Kumar Das, Sajal K. Das:
Undeniable Authentication of Digital Twin-managed Smart Microfactory. PerCom Workshops 2024: 82-87 - [i17]Indrajit Paul, Ashok Kumar Das:
Bipartite powers of some classes of bipartite graphs. CoRR abs/2404.17279 (2024) - 2023
- [j295]Garima Thakur, Pankaj Kumar, Deepika, Srinivas Jangirala, Ashok Kumar Das, Youngho Park:
An Effective Privacy-Preserving Blockchain-Assisted Security Protocol for Cloud-Based Digital Twin Environment. IEEE Access 11: 26877-26892 (2023) - [j294]Patruni Muralidhara Rao, Srinivas Jangirala, Saraswathi Pedada, Ashok Kumar Das, Youngho Park:
Blockchain Integration for IoT-Enabled V2X Communications: A Comprehensive Survey, Security Issues and Challenges. IEEE Access 11: 54476-54494 (2023) - [j293]Seunghwan Son, Deok Kyu Kwon, Sangwoo Lee, Yongsung Jeon, Ashok Kumar Das, Youngho Park:
Design of Secure and Lightweight Authentication Scheme for UAV-Enabled Intelligent Transportation Systems Using Blockchain and PUF. IEEE Access 11: 60240-60253 (2023) - [j292]Safdar Hussain Javed, Maaz Bin Ahmad, Muhammad Asif, Waseem Akram, Khalid Mahmood, Ashok Kumar Das, Sachin Shetty:
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System. IEEE Access 11: 74000-74020 (2023) - [j291]Siddhant Thapliyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty, Abdullah Alqahtani:
Design of Robust Blockchain-Envisioned Authenticated Key Management Mechanism for Smart Healthcare Applications. IEEE Access 11: 93032-93047 (2023) - [j290]Garima Thakur, Sunil Prajapat, Pankaj Kumar, Ashok Kumar Das, Sachin Shetty:
An Efficient Lightweight Provably Secure Authentication Protocol for Patient Monitoring Using Wireless Medical Sensor Networks. IEEE Access 11: 114662-114679 (2023) - [j289]Sourav Saha, Basudeb Bera, Ashok Kumar Das, Neeraj Kumar, SK Hafizul Islam, Youngho Park:
Private Blockchain Envisioned Access Control System for Securing Industrial IoT-Based Pervasive Edge Computing. IEEE Access 11: 130206-130229 (2023) - [j288]Jaskaran Singh, Keshav Sharma, Mohammad Wazid, Ashok Kumar Das:
SINN-RD: Spline interpolation-envisioned neural network-based ransomware detection scheme. Comput. Electr. Eng. 106: 108601 (2023) - [j287]Hafiz Muhammad Sanaullah Badar, Khalid Mahmood, Waseem Akram, Zahid Ghaffar, Muhammad Umar, Ashok Kumar Das:
Secure authentication protocol for home area network in smart grid-based smart cities. Comput. Electr. Eng. 108: 108721 (2023) - [j286]Basudeb Bera, Ankush Mitra, Ashok Kumar Das, Deepak Puthal, YoungHo Park:
Private Blockchain-Based AI-Envisioned Home Monitoring Framework in IoMT-Enabled COVID-19 Environment. IEEE Consumer Electron. Mag. 12(3): 62-71 (2023) - [j285]Anusha Vangala, Ashok Kumar Das, Vinay Chamola, Valery Korotaev, Joel J. P. C. Rodrigues:
Security in IoT-enabled smart agriculture: architecture, security solutions and challenges. Clust. Comput. 26(2): 879-902 (2023) - [j284]Sivaselvan N, Vivekananda Bhat K., Muttukrishnan Rajarajan, Ashok Kumar Das, Joel J. P. C. Rodrigues:
SUACC-IoT: secure unified authentication and access control system based on capability for IoT. Clust. Comput. 26(4): 2409-2428 (2023) - [j283]SungJin Yu, JoonYoung Lee, Anil Kumar Sutrala, Ashok Kumar Das, Youngho Park:
LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks. Comput. Networks 224: 109612 (2023) - [j282]Ankush Mitra, Basudeb Bera, Ashok Kumar Das, Sajjad Shaukat Jamal, Ilsun You:
Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment. Comput. Commun. 197: 173-185 (2023) - [j281]Indushree M, Manish Raj, Vipul Kumar Mishra, Shashidhara, Ashok Kumar Das, Vivekananda Bhat K.:
Mobile-Chain: Secure blockchain based decentralized authentication system for global roaming in mobility networks. Comput. Commun. 200: 1-16 (2023) - [j280]Anusha Vangala, Ashok Kumar Das, Jong-Hyouk Lee:
Provably secure signature-based anonymous user authentication protocol in an Internet of Things-enabled intelligent precision agricultural environment. Concurr. Comput. Pract. Exp. 35(16) (2023) - [j279]Neeraj Saini, Vivekananda Bhat Kasaragod, Krishna Prakasha, Ashok Kumar Das:
A hybrid ensemble machine learning model for detecting APT attacks based on network behavior anomaly detection. Concurr. Comput. Pract. Exp. 35(28) (2023) - [j278]Palak Bagga, Ashok Kumar Das, Joel J. P. C. Rodrigues:
Bilinear pairing-based access control and key agreement scheme for smart transportation. Cyber Secur. Appl. 1: 100001 (2023) - [j277]Siddhant Thapliyal, Shubham Singh, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das:
Design of blockchain-enabled secure smart health monitoring system and its testbed implementation. Cyber Secur. Appl. 1: 100020 (2023) - [j276]Neha Garg, Rajat Petwal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues:
On the design of an AI-driven secure communication scheme for internet of medical things environment. Digit. Commun. Networks 9(5): 1080-1089 (2023) - [j275]Suryakanta Panda, Samrat Mondal, Ashok Kumar Das, Willy Susilo:
Secure access privilege delegation using attribute-based encryption. Int. J. Inf. Sec. 22(5): 1261-1276 (2023) - [j274]Amina Zahoor, Khalid Mahmood, Salman Shamshad, Muhammad Asad Saleem, Muhammad Faizan Ayub, Mauro Conti, Ashok Kumar Das:
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF. Internet Things 22: 100708 (2023) - [j273]Ashok Kumar Das, Sandip Roy, Eranga Bandara, Sachin Shetty:
Securing Age-of-Information (AoI)-Enabled 5G Smart Warehouse Using Access Control Scheme. IEEE Internet Things J. 10(2): 1358-1375 (2023) - [j272]Dharminder Dharminder, Challa Bhageeratha Reddy, Ashok Kumar Das, Youngho Park, Sajjad Shaukat Jamal:
Post-Quantum Lattice-Based Secure Reconciliation Enabled Key Agreement Protocol for IoT. IEEE Internet Things J. 10(3): 2680-2692 (2023) - [j271]Prakash Tekchandani, Indranil Pradhan, Ashok Kumar Das, Neeraj Kumar, Youngho Park:
Blockchain-Enabled Secure Big Data Analytics for Internet of Things Smart Applications. IEEE Internet Things J. 10(7): 6428-6443 (2023) - [j270]Srijanee Mookherji, Vanga Odelu, Rajendra Prasath, Ashok Kumar Das, Youngho Park:
Fog-Based Single Sign-On Authentication Protocol for Electronic Healthcare Applications. IEEE Internet Things J. 10(12): 10983-10996 (2023) - [j269]Salman Shamshad, Khalid Mahmood, Usman Shamshad, Ibrar Hussain, Shafiq Hussain, Ashok Kumar Das:
A Provably Secure and Lightweight Access Control Protocol for EI-Based Vehicle to Grid Environment. IEEE Internet Things J. 10(18): 16650-16657 (2023) - [j268]Prithwi Bagchi, Basudeb Bera, Ashok Kumar Das, Sachin Shetty, Pandi Vijayakumar, Marimuthu Karuppiah:
Post Quantum Lattice-Based Secure Framework using Aggregate Signature for Ambient Intelligence Assisted Blockchain-Based IoT Applications. IEEE Internet Things Mag. 6(1): 52-58 (2023) - [j267]Sourav Bera, Suryakant Prasad, Y. Sreenivasa Rao, Ashok Kumar Das, Youngho Park:
Designing attribute-based verifiable data storage and retrieval scheme in cloud computing environment. J. Inf. Secur. Appl. 75: 103482 (2023) - [j266]Chien-Ming Chen, Shuangshuang Liu, Xuanang Li, SK Hafizul Islam, Ashok Kumar Das:
A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT. J. Syst. Archit. 136: 102831 (2023) - [j265]Sudeep Ghosh, SK Hafizul Islam, Abhishek Bisht, Ashok Kumar Das:
Provably secure public key encryption with keyword search for data outsourcing in cloud environments. J. Syst. Archit. 139: 102876 (2023) - [j264]Siddhant Thapliyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, SK Hafizul Islam:
Robust authenticated key agreement protocol for internet of vehicles-envisioned intelligent transportation system. J. Syst. Archit. 142: 102937 (2023) - [j263]Sumit Pundir, Mohammad S. Obaidat, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh, Joel J. P. C. Rodrigues:
MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach. Multim. Syst. 29(3): 1785-1797 (2023) - [j262]Supriyo De, Jaydeb Bhaumik, Debasis Giri, Ashok Kumar Das:
A new robust and fragile scheme based on chaotic maps and dwt for medical image security. Multim. Tools Appl. 82(8): 11753-11792 (2023) - [j261]Jaskaran Singh, Keshav Sharma, Mohammad Wazid, Ashok Kumar Das, Athanasios V. Vasilakos:
An Ensemble-Based IoT-Enabled Drones Detection Scheme for a Safe Community. IEEE Open J. Commun. Soc. 4: 1946-1956 (2023) - [j260]Abhishek Bisht, Ashok Kumar Das, Dusit Niyato, Youngho Park:
Efficient Personal-Health-Records Sharing in Internet of Medical Things Using Searchable Symmetric Encryption, Blockchain, and IPFS. IEEE Open J. Commun. Soc. 4: 2225-2244 (2023) - [j259]Munmun Bhattacharya, Sandip Roy, Samiran Chattopadhyay, Ashok Kumar Das, Sachin Shetty:
A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges. Secur. Priv. 6(1) (2023) - [j258]Pankaj Kumar, Mohammad Wazid, Devesh Pratap Singh, Jaskaran Singh, Ashok Kumar Das, Youngho Park, Joel J. P. C. Rodrigues:
Explainable artificial intelligence envisioned security mechanism for cyber threat hunting. Secur. Priv. 6(6) (2023) - [j257]JoonYoung Lee, MyeongHyun Kim, KiSung Park, SungKee Noh, Abhishek Bisht, Ashok Kumar Das, Youngho Park:
Blockchain-Based Data Access Control and Key Agreement System in IoT Environment. Sensors 23(11): 5173 (2023) - [j256]Munmun Bhattacharya, Sandip Roy, Samiran Chattopadhyay, Ashok Kumar Das, Sajjad Shaukat Jamal:
ASPA-MOSN: An Efficient User Authentication Scheme for Phishing Attack Detection in Mobile Online Social Networks. IEEE Syst. J. 17(1): 234-245 (2023) - [j255]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty:
BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare. IEEE Trans. Consumer Electron. 69(1): 18-28 (2023) - [j254]Kisung Park, JoonYoung Lee, Ashok Kumar Das, Youngho Park:
BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments. IEEE Trans. Dependable Secur. Comput. 20(2): 1719-1729 (2023) - [j253]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Mohsen Guizani:
AISCM-FH: AI-Enabled Secure Communication Mechanism in Fog Computing-Based Healthcare. IEEE Trans. Inf. Forensics Secur. 18: 319-334 (2023) - [j252]Anusha Vangala, Ashok Kumar Das, Ankush Mitra, Sajal K. Das, Youngho Park:
Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks. IEEE Trans. Inf. Forensics Secur. 18: 904-919 (2023) - [j251]Khalid Mahmood, Javed Ferzund, Muhammad Asad Saleem, Salman Shamshad, Ashok Kumar Das, Youngho Park:
A Provably Secure Mobile User Authentication Scheme for Big Data Collection in IoT-Enabled Maritime Intelligent Transportation System. IEEE Trans. Intell. Transp. Syst. 24(2): 2411-2421 (2023) - [j250]Khalid Mahmood, Salman Shamshad, Muhammad Faizan Ayub, Zahid Ghaffar, Muhammad Khurram Khan, Ashok Kumar Das:
Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System. IEEE Trans. Intell. Transp. Syst. 24(12): 14536-14545 (2023) - [j249]Mohammad Wazid, Siddhant Thapliyal, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty:
Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems. IEEE Trans. Netw. Sci. Eng. 10(5): 2697-2709 (2023) - [j248]Sivaselvan N, Vivekananda Bhat K., Muttukrishnan Rajarajan, Ashok Kumar Das:
A New Scalable and Secure Access Control Scheme Using Blockchain Technology for IoT. IEEE Trans. Netw. Serv. Manag. 20(3): 2957-2974 (2023) - [j247]Basker Palaniswamy, Keyvan Ansari, Alavalapati Goutham Reddy, Ashok Kumar Das, Sachin Shetty:
Robust Certificateless Authentication Protocol for the SAE J1939 Commercial Vehicles Bus. IEEE Trans. Veh. Technol. 72(4): 4493-4509 (2023) - [j246]Prithwi Bagchi, Raj Maheshwari, Basudeb Bera, Ashok Kumar Das, Youngho Park, Pascal Lorenz, David K. Y. Yau:
Public Blockchain-Envisioned Security Scheme Using Post Quantum Lattice-Based Aggregate Signature for Internet of Drones Applications. IEEE Trans. Veh. Technol. 72(8): 10393-10408 (2023) - [c40]Pankaj Kumar, Mohammad S. Obaidat, Piyush Pandey, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh:
Design of a Secure Machine Learning-Based Malware Detection and Analysis Scheme. CCCI 2023: 1-8 - [c39]Bhairvi Pant, Mohammad S. Obaidat, Shreya Singh, Mudita Pant, Mohammad Wazid, Ashok Kumar Das, Kuei-Fang Hsiao:
SLA-SCA: Secure and Lightweight Authentication and Key Agreement Mechanism for Smart City Applications. CCCI 2023: 1-7 - [c38]Surabhi Gusain Rawat, Mohammad S. Obaidat, Sumit Pundir, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh, Kuei-Fang Hsiao:
A Survey of DDoS Attacks Detection Schemes in SDN Environment. CITS 2023: 1-6 - [c37]Saksham Mittal, Amit Kumar Mishra, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty:
Multiclass Classification Approaches for Intrusion Detection in IoT-Driven Aerial Computing Environment. GLOBECOM 2023: 2160-2165 - [c36]Prithwi Bagchi, Basudeb Bera, Raj Maheshwari, Ashok Kumar Das, David K. Y. Yau, Biplab Sikdar:
An Efficient and Secure Post-Quantum Multi-Authority Ciphertext-Policy Attribute-Based Encryption Method Using Lattice. INFOCOM Workshops 2023: 1-6 - [c35]Anusha Vangala, Raj Maheshwari, Ashok Kumar Das, Shantanu Pal:
Cloud-Assisted Security Framework for Drone-Enabled Offshore Communications. INFOCOM Workshops 2023: 1-6 - [c34]Darshan Singh, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues:
Embattle The Security of E-Health System Through A Secure Authentication and Key Agreement Protocol. IWCMC 2023: 1130-1135 - [c33]Amit Kumar Mishra, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Mohsen Guizani:
Securing Fog Computing-based Industry 4.0 Communication Using Authenticated Key Agreement Scheme. IWCMC 2023: 1448-1453 - [c32]Shantanu Pal, Anusha Vangala, Zahra Jadidi, Zhe Hou, Ashok Kumar Das:
Security, Privacy and Trust for the Metaverse of Things. MetaCom 2023: 146-150 - [i16]KG Raghavendra Narayan, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath, Anish Chand Turlapaty, Ashok Kumar Das:
IIDS: Design of Intelligent Intrusion Detection System for Internet-of-Things Applications. CoRR abs/2308.00943 (2023) - [i15]Ashok Kumar Das, Indrajit Paul:
Obstruction characterization of co-TT graphs. CoRR abs/2308.12614 (2023) - [i14]Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Ashok Kumar Das, Biplab Sikdar:
Quantum Secure Threshold Private Set Intersection Protocol for IoT-Enabled Privacy Preserving Ride-Sharing Application. IACR Cryptol. ePrint Arch. 2023: 1154 (2023) - 2022
- [j245]Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, Sachin Shetty, Muhammad Khurram Khan, Joel J. P. C. Rodrigues:
ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things. IEEE Access 10: 57990-58004 (2022) - [j244]Mohammad Wazid, Ashok Kumar Das, Noor Mohd, Youngho Park:
Healthcare 5.0 Security Framework: Applications, Issues and Future Research Directions. IEEE Access 10: 129429-129442 (2022) - [j243]Sanjeev Kumar Dwivedi, Ruhul Amin, Ashok Kumar Das, Mark T. Leung, Kim-Kwang Raymond Choo, Satyanarayana Vollala:
Blockchain-based vehicular ad-hoc networks: A comprehensive survey. Ad Hoc Networks 137: 102980 (2022) - [j242]Suryakanta Panda, Samrat Mondal, Rinku Dewri, Ashok Kumar Das:
Towards achieving efficient access control of medical data with both forward and backward secrecy. Comput. Commun. 189: 36-52 (2022) - [j241]Jaskaran Singh, Mohammad Wazid, Ashok Kumar Das, Vinay Chamola, Mohsen Guizani:
Machine learning security attacks and defense approaches for emerging cyber physical applications: A comprehensive survey. Comput. Commun. 192: 316-331 (2022) - [j240]Palak Bagga, Ankush Mitra, Ashok Kumar Das, Pandi Vijayakumar, Youngho Park, Marimuthu Karuppiah:
Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system. Comput. Commun. 195: 27-39 (2022) - [j239]Basudeb Bera, Anusha Vangala, Ashok Kumar Das, Pascal Lorenz, Muhammad Khurram Khan:
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment. Comput. Stand. Interfaces 80: 103567 (2022) - [j238]Mohammad Wazid, Ashok Kumar Das, Youngho Park:
Blockchain-enabled secure communication mechanism for IoT-driven personal health records. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j237]Dharminder Dharminder, Uddeshaya Kumar, Ashok Kumar Das, Basudeb Bera, Debasis Giri, Sajjad Shaukat Jamal, Joel J. P. C. Rodrigues:
Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for IoT applications. Trans. Emerg. Telecommun. Technol. 33(9) (2022) - [j236]Mohammad Wazid, Ashok Kumar Das, Vinay Chamola, Youngho Park:
Uniting cyber security and machine learning: Advantages, challenges and future research. ICT Express 8(3): 313-321 (2022) - [j235]Durbadal Chattaraj, Basudeb Bera, Ashok Kumar Das, Joel J. P. C. Rodrigues, Youngho Park:
Designing Fine-Grained Access Control for Software-Defined Networks Using Private Blockchain. IEEE Internet Things J. 9(2): 1542-1559 (2022) - [j234]Basudeb Bera, Ashok Kumar Das, Sahil Garg, Md. Jalil Piran, M. Shamim Hossain:
Access Control Protocol for Battlefield Surveillance in Drone-Assisted IoT Environment. IEEE Internet Things J. 9(4): 2708-2721 (2022) - [j233]Salman Shamshad, Khalid Mahmood, Shafiq Hussain, Sahil Garg, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues:
An Efficient Privacy-Preserving Authenticated Key Establishment Protocol for Health Monitoring in Industrial Cyber-Physical Systems. IEEE Internet Things J. 9(7): 5142-5149 (2022) - [j232]Ashok Kumar Das, Basudeb Bera, Sourav Saha, Neeraj Kumar, Ilsun You, Han-Chieh Chao:
AI-Envisioned Blockchain-Enabled Signature-Based Key Management Scheme for Industrial Cyber-Physical Systems. IEEE Internet Things J. 9(9): 6374-6388 (2022) - [j231]Priyanka Mall, Ruhul Amin, Ashok Kumar Das, Mark T. Leung, Kim-Kwang Raymond Choo:
PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey. IEEE Internet Things J. 9(11): 8205-8228 (2022) - [j230]Mohammad Wazid, Ashok Kumar Das, Kim-Kwang Raymond Choo, Youngho Park:
SCS-WoT: Secure Communication Scheme for Web of Things Deployment. IEEE Internet Things J. 9(13): 10411-10423 (2022) - [j229]Mohammad Wazid, Basudeb Bera, Ashok Kumar Das, Saraju P. Mohanty, Minho Jo:
Fortifying Smart Transportation Security Through Public Blockchain. IEEE Internet Things J. 9(17): 16532-16545 (2022) - [j228]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty:
TACAS-IoT: Trust Aggregation Certificate-Based Authentication Scheme for Edge-Enabled IoT Systems. IEEE Internet Things J. 9(22): 22643-22656 (2022) - [j227]Munmun Bhattacharya, Sandip Roy, Ashok Kumar Das, Samiran Chattopadhyay, Soumya Banerjee, Ankush Mitra:
DDoS attack resisting authentication protocol for mobile based online social network applications. J. Inf. Secur. Appl. 65: 103115 (2022) - [j226]Mohammad Wazid, Ashok Kumar Das, Rasheed Hussain, Neeraj Kumar, Sandip Roy:
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system. J. Syst. Archit. 123: 102370 (2022) - [j225]Neha Garg, Mohammad Wazid, Jaskaran Singh, Devesh Pratap Singh, Ashok Kumar Das:
Security in IoMT-driven smart healthcare: A comprehensive review and open challenges. Secur. Priv. 5(5) (2022) - [j224]Mohamad Mulham Belal, Tanmoy Maitra, Debasis Giri, Ashok Kumar Das:
Chaotic neural networks and farfalle construction based parallel keyed secure hash function. Secur. Priv. 5(6) (2022) - [j223]Gaurang Panchal, Debasis Samanta, Ashok Kumar Das, Neeraj Kumar, Kim-Kwang Raymond Choo:
Designing Secure and Efficient Biometric-Based Access Mechanism for Cloud Services. IEEE Trans. Cloud Comput. 10(2): 749-761 (2022) - [j222]Palak Bagga, Ashok Kumar Das, Vinay Chamola, Mohsen Guizani:
Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions. Telecommun. Syst. 81(1): 125-173 (2022) - [j221]Anil Kumar Sutrala, Mohammad S. Obaidat, Sourav Saha, Ashok Kumar Das, Mamoun Alazab, Youngho Park:
Authenticated Key Agreement Scheme With User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical Systems. IEEE Trans. Intell. Transp. Syst. 23(3): 2316-2330 (2022) - [j220]Seunghwan Son, JoonYoung Lee, Yohan Park, Youngho Park, Ashok Kumar Das:
Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET. IEEE Trans. Netw. Sci. Eng. 9(3): 1346-1358 (2022) - [j219]Bimal Kumar Meher, Ruhul Amin, Ashok Kumar Das, Muhammad Khurram Khan:
KL-RAP: An Efficient Key-Less RFID Authentication Protocol Based on ECDLP for Consumer Warehouse Management System. IEEE Trans. Netw. Sci. Eng. 9(5): 3411-3420 (2022) - [j218]Raveendra Babu Ponnuru, Alavalapati Goutham Reddy, Basker Palaniswamy, Ashok Kumar Das:
EV-PUF: Lightweight Security Protocol for Dynamic Charging System of Electric Vehicles Using Physical Unclonable Functions. IEEE Trans. Netw. Sci. Eng. 9(5): 3791-3807 (2022) - [j217]Vikas Srivastava, Sumit Kumar Debnath, Basudeb Bera, Ashok Kumar Das, Youngho Park, Pascal Lorenz:
Blockchain-Envisioned Provably Secure Multivariate Identity-Based Multi-Signature Scheme for Internet of Vehicles Environment. IEEE Trans. Veh. Technol. 71(9): 9853-9867 (2022) - [j216]SungJin Yu, Ashok Kumar Das, Youngho Park, Pascal Lorenz:
SLAP-IoD: Secure and Lightweight Authentication Protocol Using Physical Unclonable Functions for Internet of Drones in Smart City Environments. IEEE Trans. Veh. Technol. 71(10): 10374-10388 (2022) - [c31]Naivedya Lath, Kaustubh Thapliyal, Kartik Kandpal, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh:
BDESF-ITS: Blockchain-Based Secure Data Exchange and Storage Framework for Intelligent Transportation System. INFOCOM Workshops 2022: 1-6 - [c30]Amarjit Sripesh, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Bharat Verma:
BAKP-IoDA: blockchain driven authentication and key agreement protocol for internet of drones based applications. DroneCom@MobiCom 2022: 25-30 - [c29]Anusha Vangala, Ashok Kumar Das:
Privacy-Preserving Blockchain-Based Authentication in Smart Energy Systems. SenSys 2022: 1208-1214 - [i13]Ashok Kumar Das, Indrajit Paul:
On Hamiltonian-Connected and Mycielski graphs. CoRR abs/2206.02385 (2022) - [i12]Ashok Kumar Das, Indrajit Paul:
Signed interval graphs and bigraphs: A generalization of interval graphs and bigraphs. CoRR abs/2206.05917 (2022) - [i11]Ashok Kumar Das, Indrajit Paul:
On powers of circular arc graphs. CoRR abs/2210.08782 (2022) - 2021
- [j215]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Prosanta Gope, Joel J. P. C. Rodrigues:
Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap. IEEE Access 9: 4466-4489 (2021) - [j214]Shashidhara, Sanjeet Kumar Nayak, Ashok Kumar Das, Youngho Park:
On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks. IEEE Access 9: 12879-12895 (2021) - [j213]SungJin Yu, Ashok Kumar Das, Youngho Park:
Comments on "ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes". IEEE Access 9: 49154-49159 (2021) - [j212]Ashok Kumar Das, Basudeb Bera, Mohammad Wazid, Sajjad Shaukat Jamal, Youngho Park:
On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure. IEEE Access 9: 71856-71867 (2021) - [j211]Ashok Kumar Das, Basudeb Bera, Mohammad Wazid, Sajjad Shaukat Jamal, Youngho Park:
iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment. IEEE Access 9: 87024-87048 (2021) - [j210]Basudeb Bera, Ashok Kumar Das, Mohammad S. Obaidat, Pandi Vijayakumar, Kuei-Fang Hsiao, Youngho Park:
AI-Enabled Blockchain-Based Access Control for Malicious Attacks Detection and Mitigation in IoE. IEEE Consumer Electron. Mag. 10(5): 82-92 (2021) - [j209]Basudeb Bera, Ashok Kumar Das, Anil Kumar Sutrala:
Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment. Comput. Commun. 166: 91-109 (2021) - [j208]Soumya Banerjee, Basudeb Bera, Ashok Kumar Das, Samiran Chattopadhyay, Muhammad Khurram Khan, Joel J. P. C. Rodrigues:
Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT. Comput. Commun. 169: 99-113 (2021) - [j207]Tarak Nandy, Mohd Yamani Idna Bin Idris, Rafidah Md Noor, Ashok Kumar Das, Xiong Li, Norjihan Binti Abdul Ghani, Sananda Bhattacharyya:
An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network. Comput. Commun. 177: 57-76 (2021) - [j206]Sourav Saha, Durbadal Chattaraj, Basudeb Bera, Ashok Kumar Das:
Consortium blockchain-enabled access control mechanism in edge computing based generic Internet of Things environment. Trans. Emerg. Telecommun. Technol. 32(6) (2021) - [j205]Abdallah Mustafa Abdelrahman, Joel J. P. C. Rodrigues, Mukhtar M. E. Mahmoud, Kashif Saleem, Ashok Kumar Das, Valery Korotaev, Sergei A. Kozlov:
Software-defined networking security for private data center networks and clouds: Vulnerabilities, attacks, countermeasures, and solutions. Int. J. Commun. Syst. 34(4) (2021) - [j204]Sherali Zeadally, Ashok Kumar Das, Nicolas Sklavos:
Cryptographic technologies and protocol standards for Internet of Things. Internet Things 14: 100075 (2021) - [j203]Basudeb Bera, Sourav Saha, Ashok Kumar Das, Athanasios V. Vasilakos:
Designing Blockchain-Based Access Control Protocol in IoT-Enabled Smart-Grid System. IEEE Internet Things J. 8(7): 5744-5761 (2021) - [j202]Jangirala Srinivas, Ashok Kumar Das, Mohammad Wazid, Athanasios V. Vasilakos:
Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System. IEEE Internet Things J. 8(9): 7727-7744 (2021) - [j201]Anusha Vangala, Anil Kumar Sutrala, Ashok Kumar Das, Minho Jo:
Smart Contract-Based Blockchain-Envisioned Authentication Scheme for Smart Farming. IEEE Internet Things J. 8(13): 10792-10806 (2021) - [j200]Muhammad Asad Saleem, Zahid Ghaffar, Khalid Mahmood, Ashok Kumar Das, Joel J. P. C. Rodrigues, Muhammad Khurram Khan:
Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function. IEEE Internet Things J. 8(22): 16613-16622 (2021) - [j199]Ashok Kumar Das, Basudeb Bera, Debasis Giri:
AI and Blockchain-Based Cloud-Assisted Secure Vaccine Distribution and Tracking in IoMT-Enabled COVID-19 Environment. IEEE Internet Things Mag. 4(2): 26-32 (2021) - [j198]Mohammad Wazid, Basudeb Bera, Ashok Kumar Das, Sahil Garg, Dusit Niyato, M. Shamim Hossain:
Secure Communication Framework for Blockchain-Based Internet of Drones-Enabled Aerial Computing Deployment. IEEE Internet Things Mag. 4(3): 120-126 (2021) - [j197]Basudeb Bera, Mohammad Wazid, Ashok Kumar Das, Joel J. P. C. Rodrigues:
Securing Internet of Drones Networks Using AI-Envisioned Smart-Contract-Based Blockchain. IEEE Internet Things Mag. 4(4): 68-73 (2021) - [j196]Basudeb Bera, Ashok Kumar Das, Sajal K. Das:
Search on Encrypted COVID-19 Healthcare Data in Blockchain-Assisted Distributed Cloud Storage. IEEE Internet Things Mag. 4(4): 127-132 (2021) - [j195]Palak Bagga, Anil Kumar Sutrala, Ashok Kumar Das, Pandi Vijayakumar:
Blockchain-based batch authentication protocol for Internet of Vehicles. J. Syst. Archit. 113: 101877 (2021) - [j194]Anup Kumar Maurya, Ashok Kumar Das, Sajjad Shaukat Jamal, Debasis Giri:
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters. J. Syst. Archit. 120: 102296 (2021) - [j193]R. Shashidhara, Nisha Ahuja, M. Lajuvanthi, S. Akhila, Ashok Kumar Das, Joel J. P. C. Rodrigues:
SDN-chain: Privacy-preserving protocol for software defined networks using blockchain. Secur. Priv. 4(6) (2021) - [j192]Dharminder Dharminder, Mohammad S. Obaidat, Dheerendra Mishra, Ashok Kumar Das:
SFEEC: Provably Secure Signcryption-Based Big Data Security Framework for Energy-Efficient Computing Environment. IEEE Syst. J. 15(1): 598-606 (2021) - [j191]Jangirala Srinivas, Ashok Kumar Das, Xiong Li, Muhammad Khurram Khan, Minho Jo:
Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems. IEEE Trans. Ind. Informatics 17(7): 4425-4436 (2021) - [j190]Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Mamoun Alazab:
Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications. IEEE Trans. Ind. Informatics 17(10): 7174-7184 (2021) - [j189]JoonYoung Lee, Geon-Hwan Kim, Ashok Kumar Das, YoungHo Park:
Secure and Efficient Honey List-Based Authentication Protocol for Vehicular Ad Hoc Networks. IEEE Trans. Netw. Sci. Eng. 8(3): 2412-2425 (2021) - [j188]Palak Bagga, Ashok Kumar Das, Mohammad Wazid, Joel J. P. C. Rodrigues, Kim-Kwang Raymond Choo, YoungHo Park:
On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System. IEEE Trans. Veh. Technol. 70(2): 1736-1751 (2021) - [j187]Durbadal Chattaraj, Basudeb Bera, Ashok Kumar Das, Sourav Saha, Pascal Lorenz, YoungHo Park:
Block-CLAP: Blockchain-Assisted Certificateless Key Agreement Protocol for Internet of Vehicles in Smart Transportation. IEEE Trans. Veh. Technol. 70(8): 8092-8107 (2021) - [j186]Raveendra Babu Ponnuru, Ruhul Amin, Alavalapati Goutham Reddy, Ashok Kumar Das, Willy Susilo, Youngho Park:
Robust Authentication Protocol for Dynamic Charging System of Electric Vehicles. IEEE Trans. Veh. Technol. 70(11): 11338-11351 (2021) - [j185]Hossein Abdi Nasib Far, Majid Bayat, Ashok Kumar Das, Mahdi Fotouhi, Seyed Morteza Pournaghi, Mohammad-Ali Doostari:
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT. Wirel. Networks 27(2): 1389-1412 (2021) - [c28]Neha Garg, Mohammad S. Obaidat, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh:
SPCS-IoTEH: Secure Privacy-Preserving Communication Scheme for IoT-Enabled e-Health Applications. ICC 2021: 1-6 - [c27]Ankush Mitra, Basudeb Bera, Ashok Kumar Das:
Design and Testbed Experiments of Public Blockchain-Based Security Framework for IoT-Enabled Drone-Assisted Wildlife Monitoring. INFOCOM Workshops 2021: 1-6 - 2020
- [j184]Sumit Pundir, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues, Youngho Park:
Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges. IEEE Access 8: 3343-3363 (2020) - [j183]Palak Bagga, Ashok Kumar Das, Mohammad Wazid, Joel J. P. C. Rodrigues, Youngho Park:
Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges. IEEE Access 8: 54314-54344 (2020) - [j182]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo:
A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things. IEEE Access 8: 88700-88716 (2020) - [j181]Neha Garg, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh, Joel J. P. C. Rodrigues, Youngho Park:
BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment. IEEE Access 8: 95956-95977 (2020) - [j180]JoonYoung Lee, SungJin Yu, MyeongHyun Kim, Youngho Park, Ashok Kumar Das:
On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks. IEEE Access 8: 107046-107062 (2020) - [j179]Kisung Park, Sungkee Noh, Hyunjin Lee, Ashok Kumar Das, MyeongHyun Kim, Youngho Park, Mohammad Wazid:
LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things. IEEE Access 8: 119387-119404 (2020) - [j178]SungJin Yu, JoonYoung Lee, Kisung Park, Ashok Kumar Das, Youngho Park:
IoV-SMAP: Secure and Efficient Message Authentication Protocol for IoV in Smart City Environment. IEEE Access 8: 167875-167886 (2020) - [j177]Seunghwan Son, JoonYoung Lee, MyeongHyun Kim, SungJin Yu, Ashok Kumar Das, Youngho Park:
Design of Secure Authentication Protocol for Cloud-Assisted Telecare Medical Information System Using Blockchain. IEEE Access 8: 192177-192191 (2020) - [j176]Mahdi Fotouhi, Majid Bayat, Ashok Kumar Das, Hossein Abdi Nasib Far, Seyed Morteza Pournaghi, Mohammad-Ali Doostari:
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Comput. Networks 177: 107333 (2020) - [j175]Basudeb Bera, Durbadal Chattaraj, Ashok Kumar Das:
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment. Comput. Commun. 153: 229-249 (2020) - [j174]Vivekananda Bhat K., Ashok Kumar Das, Jong-Hyouk Lee:
Design of a blind quantization-based audio watermarking scheme using singular value decomposition. Concurr. Comput. Pract. Exp. 32(18) (2020) - [j173]Sravani Challa, Ashok Kumar Das, Prosanta Gope, Neeraj Kumar, Fan Wu, Athanasios V. Vasilakos:
Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems. Future Gener. Comput. Syst. 108: 1267-1286 (2020) - [j172]Shobhan Mandal, Basudeb Bera, Anil Kumar Sutrala, Ashok Kumar Das, Kim-Kwang Raymond Choo, Youngho Park:
Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment. IEEE Internet Things J. 7(4): 3184-3197 (2020) - [j171]Soumya Banerjee, Sandip Roy, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Joel J. P. C. Rodrigues, Youngho Park:
Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment. J. Inf. Secur. Appl. 53: 102503 (2020) - [j170]Mohammad Wazid, Ashok Kumar Das, Vivekananda Bhat K., Athanasios V. Vasilakos:
LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment. J. Netw. Comput. Appl. 150 (2020) - [j169]Basudeb Bera, Ashok Kumar Das, Walter Balzano, Carlo Maria Medaglia:
On the design of biometric-based user authentication protocol in smart city environment. Pattern Recognit. Lett. 138: 439-446 (2020) - [j168]Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Youngho Park:
An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments. Sensors 20(4): 1215 (2020) - [j167]Sumit Pundir, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues, Youngho Park:
Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment. Sensors 20(5): 1300 (2020) - [j166]Kellow Pardini, Joel J. P. C. Rodrigues, Ousmane Diallo, Ashok Kumar Das, Victor Hugo C. de Albuquerque, Sergei A. Kozlov:
A Smart Waste Management Solution Geared towards Citizens. Sensors 20(8): 2380 (2020) - [j165]Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Willy Susilo:
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE Trans. Dependable Secur. Comput. 17(2): 391-406 (2020) - [j164]Jangirala Srinivas, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues:
Cloud Centric Authentication for Wearable Healthcare Monitoring System. IEEE Trans. Dependable Secur. Comput. 17(5): 942-956 (2020) - [j163]Jangirala Srinivas, Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar:
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things. IEEE Trans. Dependable Secur. Comput. 17(6): 1133-1146 (2020) - [j162]Srinivas Jangirala, Ashok Kumar Das, Athanasios V. Vasilakos:
Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment. IEEE Trans. Ind. Informatics 16(11): 7081-7093 (2020) - [j161]Jangirala Srinivas, Ashok Kumar Das, Joel J. P. C. Rodrigues:
2PBDC: privacy-preserving bigdata collection in cloud environment. J. Supercomput. 76(7): 4772-4801 (2020) - [j160]Anil Kumar Sutrala, Palak Bagga, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues, Pascal Lorenz:
On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment. IEEE Trans. Veh. Technol. 69(5): 5535-5548 (2020) - [j159]Basudeb Bera, Sourav Saha, Ashok Kumar Das, Neeraj Kumar, Pascal Lorenz, Mamoun Alazab:
Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment. IEEE Trans. Veh. Technol. 69(8): 9097-9111 (2020) - [c26]Santosh Kumar Desai, Amit Dua, Neeraj Kumar, Ashok Kumar Das, Joel J. P. C. Rodrigues:
Cache Poisoning Prevention Scheme in 5G-enabled Vehicular Networks: A Tangle-based Theoretical Perspective. CCNC 2020: 1-6 - [c25]Mohammad Wazid, Mohammad S. Obaidat, Ashok Kumar Das, Pandi Vijayakumar:
SAC-FIIoT: Secure Access Control Scheme for Fog-Based Industrial Internet of Things. GLOBECOM 2020: 1-6 - [c24]Sourav Saha, Anil Kumar Sutrala, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues:
On the Design of Blockchain-Based Access Control Protocol for IoT-Enabled Healthcare Applications. ICC 2020: 1-6 - [c23]Durbadal Chattaraj, Sourav Saha, Basudeb Bera, Ashok Kumar Das:
On the Design of Blockchain-Based Access Control Scheme for Software Defined Networks. INFOCOM Workshops 2020: 237-242 - [c22]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues:
On the Design of Secure Communication Framework for Blockchain-Based Internet of Intelligent Battlefield Things Environment. INFOCOM Workshops 2020: 888-893 - [c21]Mohammad Wazid, Basudeb Bera, Ankush Mitra, Ashok Kumar Das, Rashid Ali:
Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services. DroneCom@MobiCom 2020: 37-42 - [e2]Javier Prieto, Ashok Kumar Das, Stefano Ferretti, António Pinto, Juan Manuel Corchado:
Blockchain and Applications - International Congress, BLOCKCHAIN 2019, Avila, Spain, 26-28 June, 2019. Advances in Intelligent Systems and Computing 1010, Springer 2020, ISBN 978-3-030-23812-4 [contents] - [e1]Javier Prieto, António Pinto, Ashok Kumar Das, Stefano Ferretti:
Blockchain and Applications - 2nd International Congress, BLOCKCHAIN 2020, L'Aquila, Italy, 17-19 June, 2020. Advances in Intelligent Systems and Computing 1238, Springer 2020, ISBN 978-3-030-52534-7 [contents]
2010 – 2019
- 2019
- [j158]Ashok Kumar Das, Mohammad Wazid, Animi Reddy Yannam, Joel J. P. C. Rodrigues, Youngho Park:
Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment. IEEE Access 7: 55382-55397 (2019) - [j157]Kisung Park, Youngho Park, Ashok Kumar Das, SungJin Yu, JoonYoung Lee, Yohan Park:
A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things. IEEE Access 7: 76812-76832 (2019) - [j156]Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Joel J. P. C. Rodrigues, Youngho Park:
Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions. IEEE Access 7: 85627-85644 (2019) - [j155]Vivekananda Bhat K., Ashok Kumar Das, Jong-Hyouk Lee:
A Mean Quantization Watermarking Scheme for Audio Signals Using Singular-Value Decomposition. IEEE Access 7: 157480-157488 (2019) - [j154]Mohammad Wazid, Ashok Kumar Das, Joel J. P. C. Rodrigues, Sachin Shetty, Youngho Park:
IoMT Malware Detection Approaches: Analysis and Research Challenges. IEEE Access 7: 182459-182476 (2019) - [j153]Mohammad Wazid, Sherali Zeadally, Ashok Kumar Das:
Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions. IEEE Consumer Electron. Mag. 8(2): 56-60 (2019) - [j152]Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Athanasios V. Vasilakos:
Design of secure key management and user authentication scheme for fog computing services. Future Gener. Comput. Syst. 91: 475-492 (2019) - [j151]Jangirala Srinivas, Ashok Kumar Das, Neeraj Kumar:
Government regulations in cyber security: Framework, standards and recommendations. Future Gener. Comput. Syst. 92: 178-188 (2019) - [j150]Mohammad Wazid, Poonam Reshma Dsouza, Ashok Kumar Das, Vivekananda Bhat K., Neeraj Kumar, Joel J. P. C. Rodrigues:
RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment. Int. J. Commun. Syst. 32(15) (2019) - [j149]Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues:
Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment. IEEE Internet Things J. 6(2): 3572-3584 (2019) - [j148]Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Jangirala Srinivas, Neeraj Kumar, Samiran Chattopadhyay, Kim-Kwang Raymond Choo:
A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment. IEEE Internet Things J. 6(5): 8739-8752 (2019) - [j147]Mohammad Wazid, Palak Bagga, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park:
AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment. IEEE Internet Things J. 6(5): 8804-8817 (2019) - [j146]Saurav Malani, Jangirala Srinivas, Ashok Kumar Das, Kannan Srinathan, Minho Jo:
Certificate-Based Anonymous Device Access Control Scheme for IoT Environment. IEEE Internet Things J. 6(6): 9762-9773 (2019) - [j145]Majid Bayat, Zahra Zare Jousheghani, Ashok Kumar Das, Pitam Singh, Saru Kumari, Mohammad Reza Aref:
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications. ISC Int. J. Inf. Secur. 11(2): 113-128 (2019) - [j144]Goutham Reddy Alavalapati, Ashok Kumar Das, Vanga Odelu, Awais Ahmad, Ji Sun Shin:
A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment. J. Ambient Intell. Humaniz. Comput. 10(2): 661-680 (2019) - [j143]Mohammad Wazid, Ashok Kumar Das, Rasheed Hussain, Giancarlo Succi, Joel J. P. C. Rodrigues:
Authentication in cloud-driven IoT-based big data environment: Survey and outlook. J. Syst. Archit. 97: 185-196 (2019) - [j142]Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Saru Kumari, Fan Wu, Shehzad Ashraf Chaudhry, Niranchana Radhakrishnan:
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment. Mob. Networks Appl. 24(3): 1046-1062 (2019) - [j141]Mohammad Wazid, Ashok Kumar Das, Jong-Hyouk Lee:
User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions. Pervasive Mob. Comput. 54: 71-85 (2019) - [j140]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park:
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment. Sensors 19(24): 5539 (2019) - [j139]Sandip Roy, Ashok Kumar Das, Santanu Chatterjee, Neeraj Kumar, Samiran Chattopadhyay, Joel J. P. C. Rodrigues:
Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications. IEEE Trans. Ind. Informatics 15(1): 457-468 (2019) - [j138]Prosanta Gope, Ashok Kumar Das, Neeraj Kumar, Yongqiang Cheng:
Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks. IEEE Trans. Ind. Informatics 15(9): 4957-4968 (2019) - [j137]Neeraj Kumar, Gagangeet Singh Aujla, Ashok Kumar Das, Mauro Conti:
ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System. IEEE Trans. Ind. Informatics 15(12): 6572-6582 (2019) - [j136]Jangirala Srinivas, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues:
TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment. IEEE Trans. Veh. Technol. 68(7): 6903-6916 (2019) - [c20]Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Debasis Giri:
On the Design of a Secure Anonymous User Authentication Scheme for Multiple Base Stations Based Wireless Sensor Networks. ICMC 2019: 1-17 - [c19]Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Debasis Giri:
Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture. ICMC 2019: 47-66 - 2018
- [j135]Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Youngho Park, Sudeep Tanwar:
Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks. IEEE Access 6: 20673-20693 (2018) - [j134]Kisung Park, Youngho Park, YoHan Park, Ashok Kumar Das:
2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment. IEEE Access 6: 30225-30241 (2018) - [j133]Subhas Barman, Ashok Kumar Das, Debasis Samanta, Samiran Chattopadhyay, Joel J. P. C. Rodrigues, Youngho Park:
Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment. IEEE Access 6: 38578-38594 (2018) - [j132]Durbadal Chattaraj, Monalisa Sarma, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues, Youngho Park:
HEAP: An Efficient and Fault-Tolerant Authentication and Key Exchange Protocol for Hadoop-Assisted Big Data Platform. IEEE Access 6: 75342-75382 (2018) - [j131]Marimuthu Karuppiah, Xiong Li, Ashok Kumar Das, Saru Kumari, Qin Liu:
Introduction to the special section on Big data and IoT in e-healthcare. Comput. Electr. Eng. 65: 261-264 (2018) - [j130]Sravani Challa, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Saru Kumari, Muhammad Khurram Khan, Athanasios V. Vasilakos:
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput. Electr. Eng. 69: 534-554 (2018) - [j129]Marimuthu Karuppiah, Xiong Li, Ashok Kumar Das, Saru Kumari, Qin Liu:
Introduction to the special section on Big data and IoT in e-healthcare. Comput. Electr. Eng. 70: 1092-1095 (2018) - [j128]Sravani Challa, Mohammad Wazid, Ashok Kumar Das, Muhammad Khurram Khan:
Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions. IEEE Consumer Electron. Mag. 7(1): 57-65 (2018) - [j127]Gagangeet Singh Aujla, Rajat Chaudhary, Neeraj Kumar, Ashok Kumar Das, Joel J. P. C. Rodrigues:
SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment. IEEE Commun. Mag. 56(1): 78-85 (2018) - [j126]Rajat Chaudhary, Anish Jindal, Gagangeet Singh Aujla, Neeraj Kumar, Ashok Kumar Das, Neetesh Saxena:
LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment. IEEE Commun. Mag. 56(4): 24-32 (2018) - [j125]Durbadal Chattaraj, Monalisa Sarma, Ashok Kumar Das:
A new two-server authentication and key agreement protocol for accessing secure cloud services. Comput. Networks 131: 144-164 (2018) - [j124]Ashok Kumar Das, Sherali Zeadally, Debiao He:
Taxonomy and analysis of security protocols for Internet of Things. Future Gener. Comput. Syst. 89: 110-125 (2018) - [j123]SK Hafizul Islam, Ashok Kumar Das, Muhammad Khurram Khan:
A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor. Int. J. Ad Hoc Ubiquitous Comput. 27(2): 138-155 (2018) - [j122]Anil Kumar Sutrala, Ashok Kumar Das, Neeraj Kumar, Goutham Reddy Alavalapati, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues:
On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC. Int. J. Commun. Syst. 31(8) (2018) - [j121]Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Mauro Conti, Minho Jo:
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks. IEEE Internet Things J. 5(1): 269-282 (2018) - [j120]Sandip Roy, Santanu Chatterjee, Ashok Kumar Das, Samiran Chattopadhyay, Saru Kumari, Minho Jo:
Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things. IEEE Internet Things J. 5(4): 2884-2895 (2018) - [j119]Prabhjot Singh, Rasmeet Singh Bali, Neeraj Kumar, Ashok Kumar Das, Alexey V. Vinel, Laurence T. Yang:
Secure Healthcare Data Dissemination Using Vehicle Relay Networks. IEEE Internet Things J. 5(5): 3733-3746 (2018) - [j118]Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues:
Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment. IEEE Internet Things J. 5(6): 4900-4913 (2018) - [j117]Saru Kumari, Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Fan Wu, Vidushi Gupta:
Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography. J. Ambient Intell. Humaniz. Comput. 9(3): 643-653 (2018) - [j116]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Ashok Kumar Das, Jian Shen:
A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. J. Ambient Intell. Humaniz. Comput. 9(4): 919-930 (2018) - [j115]Mohammad Wazid, Ashok Kumar Das, Athanasios V. Vasilakos:
Authenticated key management protocol for cloud-assisted body area sensor networks. J. Netw. Comput. Appl. 123: 112-126 (2018) - [j114]Saru Kumari, Ashok Kumar Das, Xiong Li, Fan Wu, Muhammad Khurram Khan, Qi Jiang, SK Hafizul Islam:
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments. Multim. Tools Appl. 77(2): 2359-2389 (2018) - [j113]Santanu Chatterjee, Sandip Roy, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Athanasios V. Vasilakos:
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment. IEEE Trans. Dependable Secur. Comput. 15(5): 824-839 (2018) - [j112]Vanga Odelu, Sherali Zeadally, Ashok Kumar Das, Mohammad Wazid, Debiao He:
A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks. Telecommun. Syst. 69(4): 431-445 (2018) - [j111]Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Mauro Conti, Athanasios V. Vasilakos:
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment. IEEE J. Biomed. Health Informatics 22(4): 1299-1309 (2018) - [j110]Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, YoungHo Park:
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment. IEEE J. Biomed. Health Informatics 22(4): 1310-1322 (2018) - [j109]Anish Jindal, Amit Dua, Neeraj Kumar, Ashok Kumar Das, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues:
Providing Healthcare-as-a-Service Using Fuzzy Rule Based Big Data Analytics in Cloud Computing. IEEE J. Biomed. Health Informatics 22(5): 1605-1618 (2018) - [j108]Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, Vanga Odelu:
Attribute-based authentication on the cloud for thin clients. J. Supercomput. 74(11): 5813-5845 (2018) - [j107]Saru Kumari, Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Fan Wu, Neeraj Kumar:
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J. Supercomput. 74(12): 6428-6453 (2018) - [j106]Vanga Odelu, Ashok Kumar Das, Mohammad Wazid, Mauro Conti:
Provably Secure Authenticated Key Agreement Scheme for Smart Grid. IEEE Trans. Smart Grid 9(3): 1900-1910 (2018) - [j105]Amit Dua, Neeraj Kumar, Ashok Kumar Das, Willy Susilo:
Secure Message Communication Protocol Among Vehicles in Smart City. IEEE Trans. Veh. Technol. 67(5): 4359-4373 (2018) - [c18]Ashok Kumar Das, Rajkamal Sahu:
Mixed Unit Interval Bigraphs. CALDAM 2018: 15-29 - [c17]Santosh Kumar Desai, Amit Dua, Neeraj Kumar, Ashok Kumar Das, Joel J. P. C. Rodrigues:
Demand Response Management Using Lattice-Based Cryptography in Smart Grids. GLOBECOM 2018: 1-6 - [c16]Rajat Chaudhary, Gagangeet Singh Aujla, Neeraj Kumar, Ashok Kumar Das, Neetesh Saxena, Joel J. P. C. Rodrigues:
LaCSys: Lattice-Based Cryptosystem for Secure Communication in Smart Grid Environment. ICC 2018: 1-6 - [i10]Behnam Zahednejad, Majid Bayat, Ashok Kumar Das:
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks. IACR Cryptol. ePrint Arch. 2018: 1061 (2018) - 2017
- [j104]Sravani Challa, Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Goutham Reddy Alavalapati, Eun-Jun Yoon, Kee-Young Yoo:
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications. IEEE Access 5: 3028-3043 (2017) - [j103]Vanga Odelu, Ashok Kumar Das, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, Minho Jo:
Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts. IEEE Access 5: 3273-3283 (2017) - [j102]Goutham Reddy Alavalapati, Eun-Jun Yoon, Ashok Kumar Das, Vanga Odelu, Kee-Young Yoo:
Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment. IEEE Access 5: 3622-3639 (2017) - [j101]Santanu Chatterjee, Sandip Roy, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Goutham Reddy Alavalapati, Kisung Park, Youngho Park:
On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems. IEEE Access 5: 7012-7030 (2017) - [j100]Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Vanga Odelu, Goutham Reddy Alavalapati, Kisung Park, Youngho Park:
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks. IEEE Access 5: 14966-14980 (2017) - [j99]Kisung Park, Youngho Park, YoHan Park, Goutham Reddy Alavalapati, Ashok Kumar Das:
Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks. IEEE Access 5: 25110-25125 (2017) - [j98]Sandip Roy, Santanu Chatterjee, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Athanasios V. Vasilakos:
On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services. IEEE Access 5: 25808-25825 (2017) - [j97]Vanga Odelu, Ashok Kumar Das, Kim-Kwang Raymond Choo, Neeraj Kumar, Youngho Park:
Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices. IEEE Access 5: 27707-27721 (2017) - [j96]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Muhammad Khurram Khan, Ashok Kumar Das:
An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann. des Télécommunications 72(3-4): 131-144 (2017) - [j95]Ashok Kumar Das, Sherali Zeadally, Mohammad Wazid:
Lightweight authentication protocols for wearable devices. Comput. Electr. Eng. 63: 196-208 (2017) - [j94]Saru Kumari, Ashok Kumar Das, Mohammad Wazid, Xiong Li, Fan Wu, Kim-Kwang Raymond Choo, Muhammad Khurram Khan:
On the design of a secure user authentication and key agreement scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j93]Vanga Odelu, Ashok Kumar Das, Y. Sreenivasa Rao, Saru Kumari, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput. Stand. Interfaces 54: 3-9 (2017) - [j92]Ashok Kumar Das, Ritapa Chakraborty:
Graphs and digraphs represented by intervals and circular arcs. Discret. Appl. Math. 228: 41-49 (2017) - [j91]Vanga Odelu, Ashok Kumar Das, Saru Kumari, Xinyi Huang, Mohammad Wazid:
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Gener. Comput. Syst. 68: 74-88 (2017) - [j90]Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Kim-Kwang Raymond Choo, Jian Shen:
Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Gener. Comput. Syst. 68: 320-330 (2017) - [j89]Ashok Kumar Das:
A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int. J. Commun. Syst. 30(1) (2017) - [j88]Mohammad Wazid, Ashok Kumar Das, Muhammad Khurram Khan, Abdulatif Al-Dhawailie Al-Ghaiheb, Neeraj Kumar, Athanasios V. Vasilakos:
Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment. IEEE Internet Things J. 4(5): 1634-1646 (2017) - [j87]Prosanta Gope, Ashok Kumar Das:
Robust Anonymous Mutual Authentication Scheme for n-Times Ubiquitous Mobile Cloud Computing Services. IEEE Internet Things J. 4(5): 1764-1772 (2017) - [j86]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Jian Shen, Kim-Kwang Raymond Choo, Mohammad Wazid, Ashok Kumar Das:
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 89: 72-85 (2017) - [j85]Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues:
Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment. IEEE Trans. Ind. Informatics 13(6): 3144-3153 (2017) - [j84]Marimuthu Karuppiah, Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Muhammad Khurram Khan, R. Saravanan, Sayantani Basu:
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 93(2): 383-407 (2017) - [j83]Mohammad Wazid, Ashok Kumar Das:
A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks. Wirel. Pers. Commun. 94(3): 1165-1191 (2017) - [j82]Ashok Kumar Das, Anil Kumar Sutrala, Vanga Odelu, Adrijit Goswami:
A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks. Wirel. Pers. Commun. 94(3): 1899-1933 (2017) - [j81]Srinivas Jangirala, Sourav Mukhopadhyay, Ashok Kumar Das:
A Multi-server Environment with Secure and Efficient Remote User Authentication Scheme Based on Dynamic ID Using Smart Cards. Wirel. Pers. Commun. 95(3): 2735-2767 (2017) - [j80]Vanga Odelu, Soumya Banerjee, Ashok Kumar Das, Samiran Chattopadhyay, Saru Kumari, Xiong Li, Adrijit Goswami:
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 96(2): 2351-2387 (2017) - 2016
- [j79]Goutham Reddy Alavalapati, Ashok Kumar Das, Eun-Jun Yoon, Kee-Young Yoo:
A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography. IEEE Access 4: 4394-4407 (2016) - [j78]Jayakrushna Sahoo, Ashok Kumar Das, Adrijit Goswami:
An efficient fast algorithm for discovering closed+ high utility itemsets. Appl. Intell. 45(1): 44-74 (2016) - [j77]Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, Mohammad Wazid, Vanga Odelu:
Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput. Methods Programs Biomed. 135: 37-50 (2016) - [j76]Anil Kumar Sutrala, Ashok Kumar Das, Vanga Odelu, Mohammad Wazid, Saru Kumari:
Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems. Comput. Methods Programs Biomed. 135: 167-185 (2016) - [j75]Ashok Kumar Das, Sandip Das, Malay K. Sen:
Forbidden substructure for interval digraphs/bigraphs. Discret. Math. 339(2): 1028-1051 (2016) - [j74]Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Hamed Arshad, Muhammad Khurram Khan:
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gener. Comput. Syst. 63: 56-75 (2016) - [j73]Goutham Reddy Alavalapati, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo:
Lightweight authentication with key-agreement protocol for mobile network environment using smart cards. IET Inf. Secur. 10(5): 272-282 (2016) - [j72]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A secure and efficient time-bound hierarchical access control scheme for secure broadcasting. Int. J. Ad Hoc Ubiquitous Comput. 22(4): 236-248 (2016) - [j71]Ankita Chaturvedi, Ashok Kumar Das, Dheerendra Mishra, Sourav Mukhopadhyay:
Design of a secure smart card-based multi-server authentication scheme. J. Inf. Secur. Appl. 30: 64-80 (2016) - [j70]Goutham Reddy Alavalapati, Ashok Kumar Das, Eun-Jun Yoon, Kee-Young Yoo:
An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards. KSII Trans. Internet Inf. Syst. 10(7): 3371-3396 (2016) - [j69]Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Vanga Odelu, Muhammad Khurram Khan:
A User Anonymous Mutual Authentication Protocol. KSII Trans. Internet Inf. Syst. 10(9): 4508-4528 (2016) - [j68]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system. J. King Saud Univ. Comput. Inf. Sci. 28(1): 68-81 (2016) - [j67]Mohammad Wazid, Sherali Zeadally, Ashok Kumar Das, Vanga Odelu:
Analysis of Security Protocols for Mobile Healthcare. J. Medical Syst. 40(11): 229:1-229:10 (2016) - [j66]Saru Kumari, Fan Wu, Xiong Li, Mohammad Sabzinejad Farash, Qi Jiang, Muhammad Khurram Khan, Ashok Kumar Das:
Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card. Multim. Tools Appl. 75(24): 17215-17245 (2016) - [j65]Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay:
A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. Peer-to-Peer Netw. Appl. 9(1): 171-192 (2016) - [j64]Ashok Kumar Das:
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw. Appl. 9(1): 223-244 (2016) - [j63]Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li, Fan Wu:
Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS. Secur. Commun. Networks 9(13): 1983-2001 (2016) - [j62]Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid, Xiong Li:
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Secur. Commun. Networks 9(13): 2070-2092 (2016) - [j61]SK Hafizul Islam, Ashok Kumar Das, Muhammad Khurram Khan:
Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor. Secur. Commun. Networks 9(16): 3229-3238 (2016) - [j60]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Ashok Kumar Das, Muhammad Khurram Khan, Marimuthu Karuppiah, Renuka Baliyan:
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur. Commun. Networks 9(16): 3527-3542 (2016) - [j59]Ashok Kumar Das, Saru Kumari, Vanga Odelu, Xiong Li, Fan Wu, Xinyi Huang:
Provably secure user authentication and key agreement scheme for wireless sensor networks. Secur. Commun. Networks 9(16): 3670-3687 (2016) - [j58]Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay:
An anonymous and secure biometric-based enterprise digital rights management system for mobile environment. Secur. Commun. Networks 9(16): 3762 (2016) - [j57]Vanga Odelu, Ashok Kumar Das:
Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography. Secur. Commun. Networks 9(17): 4048-4059 (2016) - [j56]Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li, Fan Wu:
Provably secure biometric-based user authentication and key agreement scheme in cloud computing. Secur. Commun. Networks 9(17): 4103-4119 (2016) - [j55]Marimuthu Karuppiah, Saru Kumari, Ashok Kumar Das, Xiong Li, Fan Wu, Sayantani Basu:
A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks. Secur. Commun. Networks 9(17): 4192-4209 (2016) - [j54]Saru Kumari, Marimuthu Karuppiah, Xiong Li, Fan Wu, Ashok Kumar Das, Vanga Odelu:
An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks. Secur. Commun. Networks 9(17): 4255-4271 (2016) - [j53]Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Muhammad Khurram Khan:
Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Secur. Commun. Networks 9(17): 4596-4614 (2016) - [j52]Sravani Challa, Ashok Kumar Das, Saru Kumari, Vanga Odelu, Fan Wu, Xiong Li:
Provably secure three-factor authentication and key agreement scheme for session initiation protocol. Secur. Commun. Networks 9(18): 5412-5431 (2016) - [j51]Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, Vanga Odelu:
Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks. Secur. Commun. Networks 9(18): 5563-5580 (2016) - [j50]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms. IEEE Trans. Consumer Electron. 62(1): 30-38 (2016) - [j49]Xiong Li, Jianwei Niu, Saru Kumari, SK Hafizul Islam, Fan Wu, Muhammad Khurram Khan, Ashok Kumar Das:
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security. Wirel. Pers. Commun. 89(2): 569-597 (2016) - [j48]Mohammad Wazid, Ashok Kumar Das:
An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks. Wirel. Pers. Commun. 90(4): 1971-2000 (2016) - [j47]Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay, Mohammad Wazid:
A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography. Wirel. Pers. Commun. 91(3): 1361-1391 (2016) - [c15]Ashok Kumar Das, Ritapa Chakraborty:
Forbidden Subgraphs of Bigraphs of Ferrers Dimension 2. ICTCSDM 2016: 38-49 - [c14]Goutham Reddy Alavalapati, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo:
An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol. SIN 2016: 145-149 - 2015
- [j46]Ashok Kumar Das, Santanu Chatterjee, Jamuna Kanta Sing:
A New Biometric-Based Remote User Authentication Scheme in Hierarchical Wireless Body Area Sensor Networks. Ad Hoc Sens. Wirel. Networks 28(3-4): 221-256 (2015) - [j45]Ashok Kumar Das, Ritapa Chakraborty:
New characterizations of proper interval bigraphs. AKCE Int. J. Graphs Comb. 12(1): 47-53 (2015) - [j44]Jayakrushna Sahoo, Ashok Kumar Das, Adrijit Goswami:
An efficient approach for mining association rules from high utility itemsets. Expert Syst. Appl. 42(13): 5754-5778 (2015) - [j43]Santanu Chatterjee, Ashok Kumar Das, Jamuna Kanta Sing:
A secure and effective access control scheme for distributed wireless sensor networks. Int. J. Commun. Networks Distributed Syst. 14(1): 40-73 (2015) - [j42]Ashok Kumar Das:
An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks. Int. J. Commun. Networks Distributed Syst. 15(1): 22-60 (2015) - [j41]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card. J. Inf. Secur. Appl. 21: 1-19 (2015) - [j40]Dheerendra Mishra, Ashok Kumar Das, Ankita Chaturvedi, Sourav Mukhopadhyay:
A secure password-based authentication and key agreement scheme using smart cards. J. Inf. Secur. Appl. 23: 28-43 (2015) - [j39]Ashok Kumar Das, Adrijit Goswami:
A robust anonymous biometric-based remote user authentication scheme using smart cards. J. King Saud Univ. Comput. Inf. Sci. 27(2): 193-210 (2015) - [j38]Ashok Kumar Das:
A Secure and Robust Password-Based Remote User Authentication Scheme Using Smart Cards for the Integrated EPR Information System. J. Medical Syst. 39(3): 25 (2015) - [j37]Ashok Kumar Das:
A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems. J. Medical Syst. 39(3): 30 (2015) - [j36]Ashok Kumar Das, Vanga Odelu, Adrijit Goswami:
A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS. J. Medical Syst. 39(9): 92:1-92:24 (2015) - [j35]Jayakrushna Sahoo, Ashok Kumar Das, Adrijit Goswami:
An effective association rule mining scheme using a new generic basis. Knowl. Inf. Syst. 43(1): 127-156 (2015) - [j34]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. Secur. Commun. Networks 8(9): 1732-1751 (2015) - [j33]Santanu Chatterjee, Ashok Kumar Das:
An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Secur. Commun. Networks 8(9): 1752-1771 (2015) - [j32]Ashok Kumar Das, Dheerendra Mishra, Sourav Mukhopadhyay:
An anonymous and secure biometric-based enterprise digital rights management system for mobile environment. Secur. Commun. Networks 8(18): 3383-3404 (2015) - [j31]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards. Secur. Commun. Networks 8(18): 4136-4156 (2015) - [j30]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards. IEEE Trans. Inf. Forensics Secur. 10(9): 1953-1966 (2015) - [j29]Ashok Kumar Das:
A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks. Wirel. Pers. Commun. 82(3): 1377-1404 (2015) - [j28]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks. Wirel. Pers. Commun. 84(1): 207-230 (2015) - [j27]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems. Wirel. Pers. Commun. 84(4): 2571-2598 (2015) - [j26]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks. Wirel. Pers. Commun. 85(4): 1765-1788 (2015) - [c13]Ashok Kumar Das, Ritapa Chakraborty:
New Characterizations of Proper Interval Bigraphs and Proper Circular Arc Bigraphs. CALDAM 2015: 117-125 - [i9]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices. IACR Cryptol. ePrint Arch. 2015: 841 (2015) - 2014
- [j25]Santanu Chatterjee, Ashok Kumar Das, Jamuna Kanta Sing:
An Enhanced Access Control Scheme in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 21(1-2): 121-149 (2014) - [j24]Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay:
A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Syst. Appl. 41(18): 8129-8143 (2014) - [j23]Ashok Kumar Das, Adrijit Goswami, Vanga Odelu:
An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function. Int. J. Commun. Networks Distributed Syst. 12(2): 129-151 (2014) - [j22]Ashok Kumar Das, Santanu Chatterjee, Jamuna Kanta Sing:
Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks. Int. J. Trust. Manag. Comput. Commun. 2(1): 78-102 (2014) - [j21]Santanu Chatterjee, Ashok Kumar Das, Jamuna Kanta Sing:
A survey on user access control in wireless sensor networks with formal security verification. Int. J. Trust. Manag. Comput. Commun. 2(3): 259-295 (2014) - [j20]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Inf. Sci. 269: 270-285 (2014) - [j19]Santanu Chatterjee, Ashok Kumar Das, Jamuna Kanta Sing:
A novel and efficient user access control scheme for wireless body area sensor networks. J. King Saud Univ. Comput. Inf. Sci. 26(2): 181-201 (2014) - [j18]Ashok Kumar Das, Adrijit Goswami:
An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function. J. Medical Syst. 38(6): 27 (2014) - [c12]Ashok Kumar Das:
Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks. SSCC 2014: 1-9 - [c11]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks. SSCC 2014: 10-19 - [i8]Jayakrushna Sahoo, Ashok Kumar Das, Adrijit Goswami:
An Algorithm for Mining High Utility Closed Itemsets and Generators. CoRR abs/1410.2988 (2014) - [i7]Ashok Kumar Das:
On the Security of 'An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'. IACR Cryptol. ePrint Arch. 2014: 643 (2014) - [i6]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
Cryptanalysis on 'Robust Biometrics-Based Authentication Scheme for Multi-server Environment'. IACR Cryptol. ePrint Arch. 2014: 715 (2014) - 2013
- [j17]Ashok Kumar Das, Santanu Chatterjee, Jamuna Kanta Sing:
A Novel Efficient Access Control Scheme for Large-Scale Distributed Wireless Sensor Networks. Int. J. Found. Comput. Sci. 24(5): 625-654 (2013) - [j16]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A novel linear polynomial-based dynamic key management scheme for hierarchical access control. Int. J. Trust. Manag. Comput. Commun. 1(2): 156-174 (2013) - [j15]Ashok Kumar Das, Ashish Massand, Sagar Patil:
A novel proxy signature scheme based on user hierarchical access control policy. J. King Saud Univ. Comput. Inf. Sci. 25(2): 219-228 (2013) - [j14]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System. J. Medical Syst. 37(2): 9920 (2013) - [j13]Ashok Kumar Das, Adrijit Goswami:
A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care. J. Medical Syst. 37(3): 9948 (2013) - [j12]Ashok Kumar Das, Bezawada Bruhadeshwar:
An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System. J. Medical Syst. 37(5): 9969 (2013) - [j11]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A New Key Management Scheme for a User Hierarchy based on a Hybrid Cryptosystem. Smart Comput. Rev. 3(1): 42-54 (2013) - [c10]Ashok Kumar Das, Bezawada Bruhadeshwar:
A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks. AINA Workshops 2013: 291-296 - [c9]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
LHSC: An effective dynamic key management scheme for linear hierarchical access control. COMSNETS 2013: 1-9 - [c8]Ashok Kumar Das, Vanga Odelu, Adrijit Goswami:
Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function. SSCC 2013: 236-242 - [c7]Ashok Kumar Das, Santanu Chatterjee, Jamuna Kanta Sing:
Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks. SSCC 2013: 243-254 - 2012
- [j10]Ashok Kumar Das:
A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int. J. Inf. Sec. 11(3): 189-211 (2012) - [j9]Ashok Kumar Das:
Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks. Int. J. Netw. Secur. 14(1): 1-21 (2012) - [j8]Ashok Kumar Das, Nayan Ranjan Paul, Laxminath Tripathy:
Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Inf. Sci. 209: 80-92 (2012) - [j7]Ashok Kumar Das, Pranay Sharma, Santanu Chatterjee, Jamuna Kanta Sing:
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J. Netw. Comput. Appl. 35(5): 1646-1656 (2012) - [c6]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials. SNDS 2012: 1-10 - 2011
- [j6]Ashok Kumar Das:
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Secur. 5(3): 145-151 (2011) - [j5]Kavitha Ammayappan, Atul Negi, V. N. Sastry, Ashok Kumar Das:
An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks. J. Comput. 6(11): 2408-2416 (2011) - [j4]Ashok Kumar Das:
An efficient random key distribution scheme for large-scale distributed sensor networks. Secur. Commun. Networks 4(2): 162-180 (2011) - [i5]Ashok Kumar Das:
Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards. CoRR abs/1103.3159 (2011) - [i4]Ashok Kumar Das:
An Improved Efficient Key Distribution Mechanism for Large-Scale Heterogeneous Mobile Sensor Networks. CoRR abs/1103.4496 (2011) - [i3]Ashok Kumar Das, Debasis Giri:
An Identity Based Key Management Scheme in Wireless Sensor Networks. CoRR abs/1103.4676 (2011) - [i2]Ashok Kumar Das:
An Unconditionally Secure Key Management Scheme for Large-Scale Heterogeneous Wireless Sensor Networks. CoRR abs/1103.4678 (2011) - [i1]Ashok Kumar Das:
A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge. CoRR abs/1108.1302 (2011)
2000 – 2009
- 2009
- [j3]Ashok Kumar Das:
A Location-Adaptive Key Establishment Scheme for Large-Scale Distributed Wireless Sensor Networks. J. Comput. 4(9): 896-904 (2009) - 2008
- [j2]Ashok Kumar Das:
An Identity-ased Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks. Int. J. Netw. Secur. 6(2): 134-144 (2008) - [j1]Ashok Kumar Das:
ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks. Int. J. Netw. Secur. 7(3): 358-369 (2008) - [c5]Ashok Kumar Das, Indranil Sengupta:
An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials. COMSWARE 2008: 9-16 - 2007
- [c4]Ashok Kumar Das, Indranil Sengupta:
A Key Establishment Scheme for Large-Scale Mobile Wireless Sensor Networks. ICDCIT 2007: 79-88 - 2006
- [c3]Ashok Kumar Das, S. K. Ghosh:
A bidirectional linear semi-systolic architecture for DCT-domain image resizing processor. ISCAS 2006 - 2005
- [c2]Ashok Kumar Das:
A Key Reshuffling Scheme for Wireless Sensor Networks. ICISS 2005: 205-216 - [c1]Ashok Kumar Das, Abhijit Das, Surjyakanta Mohapatra, Srihari Vavilapalli:
Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks. IWDC 2005: 404-409
Coauthor Index
aka: Alavalapati Goutham Reddy
aka: Srinivas Jangirala
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint