An elliptic curve cryptography based lightweight authentication scheme for smart grid communication K Mahmood, SA Chaudhry, H Naqvi, S Kumari, X Li, AK Sangaiah Future Generation Computer Systems 81, 557-565, 2018 | 248 | 2018 |
Sixth generation (6G) wireless networks: Vision, research activities, challenges and potential solutions MH Alsharif, AH Kelechi, MA Albreem, SA Chaudhry, MS Zia, S Kim Symmetry 12 (4), 676, 2020 | 242 | 2020 |
A lightweight message authentication scheme for smart grid communications in power sector K Mahmood, SA Chaudhry, H Naqvi, T Shon, HF Ahmad Computers & Electrical Engineering 52, 114-124, 2016 | 197 | 2016 |
Efficient end-to-end authentication protocol for wearable health monitoring systems Q Jiang, J Ma, C Yang, X Ma, J Shen, SA Chaudhry Computers & Electrical Engineering 63, 182-195, 2017 | 135 | 2017 |
Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems SA Chaudhry, H Naqvi, T Shon, M Sher, MS Farash Journal of medical systems 39 (6), 66, 2015 | 131* | 2015 |
An improved and provably secure privacy preserving authentication protocol for SIP SA Chaudhry, H Naqvi, M Sher, MS Farash, MU Hassan Peer-to-Peer Networking and Applications 10 (1), 1-15, 2017 | 124 | 2017 |
A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography SA Chaudhry, MS Farash, H Naqvi, M Sher Electronic Commerce Research 16, 113-139, 2016 | 121 | 2016 |
Securing smart city surveillance: A lightweight authentication mechanism for unmanned vehicles Z Ali, SA Chaudhry, MS Ramzan, F Al-Turjman IEEE Access 8, 43711-43724, 2020 | 115 | 2020 |
An enhanced privacy preserving remote user authentication scheme with provable security SA Chaudhry, MS Farash, H Naqvi, S Kumari, MK Khan Security and Communication Networks 8 (18), 3782-3795, 2015 | 93 | 2015 |
An improved smart card based authentication scheme for session initiation protocol S Kumari, SA Chaudhry, F Wu, X Li, MS Farash, MK Khan Peer-to-Peer Networking and Applications 10, 92-105, 2017 | 92 | 2017 |
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security MS Farash, SA Chaudhry, M Heydari, S Sadough, S Mohammad, ... International Journal of Communication Systems 30 (4), e3019, 2017 | 89 | 2017 |
Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure K Mahmood, X Li, SA Chaudhry, H Naqvi, S Kumari, AK Sangaiah, ... Future Generation Computer Systems 88, 491-500, 2018 | 84 | 2018 |
Machine learning algorithms for smart data analysis in internet of things environment: taxonomies and research trends MH Alsharif, AH Kelechi, K Yahya, SA Chaudhry Symmetry 12 (1), 88, 2020 | 83 | 2020 |
Securing IoT-based RFID systems: A robust authentication protocol using symmetric cryptography K Mansoor, A Ghani, SA Chaudhry, S Shamshirband, SAK Ghayyur, ... Sensors 19 (21), 4752, 2019 | 81 | 2019 |
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems SA Chaudhry, T Shon, F Al-Turjman, MH Alsharif Computer Communications 153, 527-537, 2020 | 77 | 2020 |
Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key A Ghani, K Mansoor, S Mehmood, SA Chaudhry, AU Rahman, ... International Journal of Communication Systems 32 (16), e4139, 2019 | 77 | 2019 |
A provably secure and efficient authenticated key agreement scheme for energy internet-based vehicle-to-grid technology framework A Irshad, M Usman, SA Chaudhry, H Naqvi, M Shafiq IEEE Transactions on Industry Applications 56 (4), 4425-4435, 2020 | 76 | 2020 |
An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography SA Chaudhry, K Mahmood, H Naqvi, MK Khan Journal of Medical Systems 39, 1-12, 2015 | 75 | 2015 |
A single round-trip sip authentication scheme for voice over internet protocol using smart card A Irshad, M Sher, E Rehman, SA Ch, MU Hassan, A Ghani Multimedia Tools and Applications 74, 3967-3984, 2015 | 75 | 2015 |
A robust authentication and access control protocol for securing wireless healthcare sensor networks Z Ali, A Ghani, I Khan, SA Chaudhry, SKH Islam, D Giri Journal of Information Security and Applications 52, 102502, 2020 | 73 | 2020 |