An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment MS Farash, M Turkanović, S Kumari, M Hölbl Ad Hoc Networks 36, 152-176, 2016 | 531 | 2016 |
A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things X Li, J Niu, MZA Bhuiyan, F Wu, M Karuppiah, S Kumari IEEE Transactions on Industrial Informatics 14 (8), 3599-3609, 2017 | 385 | 2017 |
Epidemiology, clinical profile, management, and outcome of COVID-19-associated rhino-orbital-cerebral mucormycosis in 2826 patients in India–Collaborative OPAI-IJO Study on … M Sen, SG Honavar, R Bansal, S Sengupta, R Rao, U Kim, M Sharma, ... Indian journal of ophthalmology 69 (7), 1670-1692, 2021 | 364 | 2021 |
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments X Li, J Niu, S Kumari, F Wu, AK Sangaiah, KKR Choo Journal of Network and Computer Applications 103, 194-204, 2018 | 361 | 2018 |
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta, KKR Choo Computer Networks 129, 429-443, 2017 | 309 | 2017 |
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication K Mahmood, SA Chaudhry, H Naqvi, S Kumari, X Li, AK Sangaiah Future Generation Computer Systems 81, 557-565, 2018 | 305 | 2018 |
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers S Kumari, M Karuppiah, AK Das, X Li, F Wu, N Kumar The Journal of Supercomputing 74 (12), 6428-6453, 2018 | 276 | 2018 |
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks F Wu, X Li, AK Sangaiah, L Xu, S Kumari, L Wu, J Shen Future Generation Computer Systems 82, 727-737, 2018 | 246 | 2018 |
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks S Challa, AK Das, V Odelu, N Kumar, S Kumari, MK Khan, AV Vasilakos Computers & Electrical Engineering 69, 534-554, 2018 | 230 | 2018 |
Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things S Roy, S Chatterjee, AK Das, S Chattopadhyay, S Kumari, M Jo IEEE Internet of Things Journal 5 (4), 2884-2895, 2017 | 211 | 2017 |
Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices S Qiu, D Wang, G Xu, S Kumari IEEE Transactions on Dependable and Secure Computing 19 (2), 1338-1351, 2020 | 207 | 2020 |
Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications X Li, S Liu, F Wu, S Kumari, JJPC Rodrigues IEEE Internet of Things Journal 6 (3), 4755-4763, 2018 | 203 | 2018 |
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment F Wu, L Xu, S Kumari, X Li, J Shen, KKR Choo, M Wazid, AK Das Journal of Network and Computer Applications 89, 72-85, 2017 | 191 | 2017 |
User authentication schemes for wireless sensor networks: A review S Kumari, MK Khan, M Atiquzzaman Ad Hoc Networks 27, 159-194, 2015 | 178 | 2015 |
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps S Kumari, X Li, F Wu, AK Das, H Arshad, MK Khan Future Generation Computer Systems 63, 56-75, 2016 | 175 | 2016 |
PoRX: A reputation incentive scheme for blockchain consensus of IIoT EK Wang, Z Liang, CM Chen, S Kumari, MK Khan Future generation computer systems 102, 140-151, 2020 | 165 | 2020 |
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring R Ali, AK Pal, S Kumari, M Karuppiah, M Conti Future Generation Computer Systems 84, 200-215, 2018 | 165 | 2018 |
Design of a provably secure biometrics-based multi-cloud-server authentication scheme S Kumari, X Li, F Wu, AK Das, KKR Choo, J Shen Future Generation Computer Systems 68, 320-330, 2017 | 164 | 2017 |
Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce D Mishra, S Mukhopadhyay, S Kumari, MK Khan, A Chaturvedi Journal of medical systems 38, 1-11, 2014 | 163 | 2014 |
A secure authenticated and key exchange scheme for fog computing CM Chen, Y Huang, KH Wang, S Kumari, ME Wu Enterprise Information Systems 15 (9), 1200-1215, 2021 | 157 | 2021 |