A lightweight message authentication scheme for smart grid communications in power sector

K Mahmood, SA Chaudhry, H Naqvi, T Shon… - Computers & Electrical …, 2016 - Elsevier
Abstract The Internet of Things (IoT) has plenty of applications including Smart Grid (SG). IoT
enables smooth and efficient utilization of SG. It is assumed as the prevalent illustration of …

Efficient privacy-aware authentication scheme for mobile cloud computing services

D He, N Kumar, MK Khan, L Wang… - IEEE Systems …, 2016 - ieeexplore.ieee.org
With the exponential increase of the mobile devices and the fast development of cloud
computing, a new computing paradigm called mobile cloud computing (MCC) is put forward …

An improved and provably secure privacy preserving authentication protocol for SIP

SA Chaudhry, H Naqvi, M Sher, MS Farash… - Peer-to-Peer Networking …, 2017 - Springer
Abstract Session Initiation Protocol (SIP) has proved to be the integral part and parcel of any
multimedia based application or IP-based telephony service that requires signaling. SIP …

[HTML][HTML] An improved anonymous authentication scheme for telecare medical information systems

F Wen, D Guo - Journal of medical systems, 2014 - Springer
Telecare medical information system (TMIS) constructs an efficient and convenient
connection between patients and the medical server. The patients can enjoy medical …

A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography

SA Chaudhry, MS Farash, H Naqvi, M Sher - Electronic Commerce …, 2016 - Springer
The use of e-payment system for electronic trade is on its way to make daily life more easy
and convenient. Contrarily, there are a number of security issues to be addressed, user …

An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC

H Arshad, M Nikooghadam - Multimedia Tools and Applications, 2016 - Springer
The session initiation protocol (SIP) is a powerful and superior signaling protocol for the
voice over internet protocol (VoIP). Authentication is an important security requirement for …

An improved smart card based authentication scheme for session initiation protocol

S Kumari, SA Chaudhry, F Wu, X Li, MS Farash… - Peer-to-Peer Networking …, 2017 - Springer
Sessioninitiation protocol (SIP) reformed the controlling routine of voice over Internet
Protocol based communication over public channels. SIP is inherently insecure because of …

An enhanced privacy preserving remote user authentication scheme with provable security

SA Chaudhry, MS Farash, H Naqvi… - Security and …, 2015 - Wiley Online Library
Very recently, Kumari et al. proposed a symmetric key and smart card‐based remote user
password authentication scheme to enhance Chung et al.'s scheme. They claimed their …

A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security

MS Farash, SA Chaudhry, M Heydari… - International Journal …, 2017 - Wiley Online Library
Ubiquitous networks provide roaming service for mobile nodes enabling them to use the
services extended by their home networks in a foreign network. A mutual authentication …

[HTML][HTML] An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography

SA Chaudhry, K Mahmood, H Naqvi… - Journal of Medical Systems, 2015 - Springer
Telecare medicine information system (TMIS) offers the patients convenient and expedite
healthcare services remotely anywhere. Patient security and privacy has emerged as key …