Secure signature-based authenticated key establishment scheme for future IoT applications S Challa, M Wazid, AK Das, N Kumar, AG Reddy, EJ Yoon, KY Yoo IEEE Access 5, 3028-3043, 2017 | 443 | 2017 |
A secure biometrics-based multi-server authentication protocol using smart cards V Odelu, AK Das, A Goswami IEEE Transactions on Information Forensics and Security 10 (9), 1953-1966, 2015 | 439 | 2015 |
Design of secure user authenticated key management protocol for generic IoT networks M Wazid, AK Das, V Odelu, N Kumar, M Conti, M Jo IEEE Internet of Things Journal 5 (1), 269-282, 2017 | 399 | 2017 |
Secure remote user authenticated key establishment protocol for smart home environment M Wazid, AK Das, V Odelu, N Kumar, W Susilo IEEE Transactions on Dependable and Secure Computing 17 (2), 391-406, 2017 | 345 | 2017 |
Provably secure authenticated key agreement scheme for smart grid V Odelu, AK Das, M Wazid, M Conti IEEE Transactions on Smart Grid 9 (3), 1900-1910, 2016 | 341 | 2016 |
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards AK Das IET Information Security 5 (3), 145-151, 2011 | 300 | 2011 |
Design and analysis of secure lightweight remote user authentication and key agreement scheme in Internet of drones deployment M Wazid, AK Das, N Kumar, AV Vasilakos, JJPC Rodrigues IEEE Internet of Things Journal 6 (2), 3572-3584, 2018 | 291 | 2018 |
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks AK Das, P Sharma, S Chatterjee, JK Sing Journal of Network and Computer Applications 35 (5), 1646-1656, 2012 | 289 | 2012 |
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers S Kumari, M Karuppiah, AK Das, X Li, F Wu, N Kumar The Journal of Supercomputing 74 (12), 6428-6453, 2018 | 275 | 2018 |
Cloud centric authentication for wearable healthcare monitoring system J Srinivas, AK Das, N Kumar, JJPC Rodrigues IEEE Transactions on Dependable and Secure Computing 17 (5), 942-956, 2018 | 262 | 2018 |
Government regulations in cyber security: Framework, standards and recommendations J Srinivas, AK Das, N Kumar Future Generation Computer Systems 92, 178-188, 2019 | 253 | 2019 |
Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks P Gope, AK Das, N Kumar, Y Cheng IEEE transactions on industrial informatics 15 (9), 4957-4968, 2019 | 249 | 2019 |
TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment J Srinivas, AK Das, N Kumar, JJPC Rodrigues IEEE Transactions on Vehicular Technology 68 (7), 6903-6916, 2019 | 245 | 2019 |
A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards D Mishra, AK Das, S Mukhopadhyay Expert Systems with Applications 41 (18), 8129-8143, 2014 | 236 | 2014 |
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks S Challa, AK Das, V Odelu, N Kumar, S Kumari, MK Khan, AV Vasilakos Computers & Electrical Engineering 69, 534-554, 2018 | 230 | 2018 |
LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment M Wazid, AK Das, V Bhat, AV Vasilakos Journal of Network and Computer Applications 150, 102496, 2020 | 226 | 2020 |
Smart secure sensing for IoT-based agriculture: Blockchain perspective A Vangala, AK Das, N Kumar, M Alazab IEEE Sensors Journal, 2020 | 221 | 2020 |
AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment M Wazid, P Bagga, AK Das, S Shetty, JJPC Rodrigues, Y Park IEEE Internet of Things Journal 6 (5), 8804-8817, 2019 | 212 | 2019 |
Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things S Roy, S Chatterjee, AK Das, S Chattopadhyay, S Kumari, M Jo IEEE Internet of Things Journal 5 (4), 2884-2895, 2017 | 211 | 2017 |
Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment S Chatterjee, S Roy, AK Das, S Chattopadhyay, N Kumar, AV Vasilakos IEEE Transactions on Dependable and Secure Computing 15 (5), 824-839, 2016 | 210 | 2016 |