Smart contract-based blockchain-envisioned authentication scheme for smart farming A Vangala, AK Sutrala, AK Das, M Jo IEEE Internet of Things Journal 8 (13), 10792-10806, 2021 | 132 | 2021 |
Certificateless-signcryption-based three-factor user access control scheme for IoT environment S Mandal, B Bera, AK Sutrala, AK Das, KKR Choo, Y Park IEEE Internet of Things Journal 7 (4), 3184-3197, 2020 | 129 | 2020 |
On the design of conditional privacy preserving batch verification-based authentication scheme for internet of vehicles deployment AK Sutrala, P Bagga, AK Das, N Kumar, JJPC Rodrigues, P Lorenz IEEE Transactions on Vehicular Technology 69 (5), 5535-5548, 2020 | 122 | 2020 |
An efficient multi‐gateway‐based three‐factor user authentication and key agreement scheme in hierarchical wireless sensor networks AK Das, AK Sutrala, S Kumari, V Odelu, M Wazid, X Li Security and Communication Networks 9 (13), 2070-2092, 2016 | 104 | 2016 |
Blockchain-based batch authentication protocol for Internet of Vehicles P Bagga, AK Sutrala, AK Das, P Vijayakumar Journal of Systems Architecture 113, 101877, 2021 | 98 | 2021 |
Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment B Bera, AK Das, AK Sutrala Computer Communications 166, 91-109, 2021 | 98 | 2021 |
A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks AK Das, AK Sutrala, V Odelu, A Goswami Wireless Personal Communications 94, 1899-1933, 2017 | 75 | 2017 |
Authenticated key agreement scheme with user anonymity and untraceability for 5G-enabled softwarized industrial cyber-physical systems AK Sutrala, MS Obaidat, S Saha, AK Das, M Alazab, Y Park IEEE Transactions on Intelligent Transportation Systems 23 (3), 2316-2330, 2021 | 72 | 2021 |
On the design of blockchain-based access control protocol for IoT-enabled healthcare applications S Saha, AK Sutrala, AK Das, N Kumar, JJPC Rodrigues ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020 | 62 | 2020 |
Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems AK Sutrala, AK Das, V Odelu, M Wazid, S Kumari Computer methods and programs in biomedicine 135, 167-185, 2016 | 51 | 2016 |
On the design of secure user authenticated key management scheme for multigateway‐based wireless sensor networks using ECC AK Sutrala, AK Das, N Kumar, AG Reddy, AV Vasilakos, JJPC Rodrigues International Journal of Communication Systems 31 (8), e3514, 2018 | 27 | 2018 |
LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks S Yu, J Lee, AK Sutrala, AK Das, Y Park Computer networks 224, 109612, 2023 | 16 | 2023 |
Assessing the container-readiness of software applications VS Karukuri, AK Sutrala, MK Segu US Patent App. 16/158,749, 2020 | 6 | 2020 |
User authentication based on biometric passwords AK Sutrala, DR Venkivolu, J Kona US Patent App. 16/157,877, 2020 | 6 | 2020 |
Design and Analysis of Three-Factor User Authentication Schemes for Wireless Sensor Networks AK Sutrala International Institute of Information Technology, Hyderabad, 2018 | 3 | 2018 |