Author of the publication

A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof.

, , , , and . Security and Communication Networks, 8 (18): 3847-3863 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kumari, Saru
add a person with the name Kumari, Saru
 

Other publications of authors with the same name

Further cryptanalysis of 'A remote authentication scheme using mobile device'., , and . CASoN, page 234-237. IEEE, (2012)An Improved Efficient Remote Password Authentication Scheme with Smart Card over Insecure Networks., , and . I. J. Network Security, 13 (3): 167-177 (2011)An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement., , , and . Security and Communication Networks, 7 (11): 1921-1932 (2014)A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity., , , , , and . Security and Communication Networks, 9 (15): 2643-2655 (2016)Cryptanalysis of a robust smart card authentication scheme for multi-server architecture., , , , and . ISBAST, page 120-123. IEEE, (2014)Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'., and . Int. J. Communication Systems, 27 (12): 3939-3955 (2014)Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks., , and . Peer-to-Peer Networking and Applications, 10 (1): 79-91 (2017)An efficient and secure design of multi-server authenticated key agreement protocol., , , , , , and . The Journal of Supercomputing, 74 (9): 4771-4797 (2018)An elliptic curve cryptography based lightweight authentication scheme for smart grid communication., , , , , and . Future Generation Comp. Syst., (2018)Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems., , , , and . J. Medical Systems, 38 (6): 24 (2014)