• Publications
  • Influence
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
TLDR
We propose a CPPA scheme for VANETs that does not use bilinear paring and we demonstrate that it could supports both the mutual authentication and the privacy protection simultaneously. Expand
  • 282
  • 33
  • PDF
Robust Biometrics-Based Authentication Scheme for Multiserver Environment
TLDR
The authentication scheme is an important cryptographic mechanism, through which two communication parties could authenticate each other in the open network environment. Expand
  • 271
  • 16
  • PDF
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
TLDR
We proposed an efficient authentication protocol for health-care applications using WMSNs and claimed that it could withstand various attacks. Expand
  • 186
  • 15
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
TLDR
We explore the inherent conflicts and unavoidable trade-offs among the design criteria in designing an anonymous two-factor authentication scheme that satisfies all the desirable goals, including usability, security and privacy. Expand
  • 249
  • 14
  • PDF
An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography
  • D. He, S. Zeadally
  • Computer Science
  • IEEE Internet of Things Journal
  • 1 February 2015
TLDR
In this paper, we discuss the security requirements of RFID authentication schemes, and in particular, we present a review of ECC-based RFID Authentication schemes in terms of performance and security. Expand
  • 189
  • 14
Anonymous Authentication for Wireless Body Area Networks With Provable Security
Advances in wireless communications, embedded systems, and integrated circuit technologies have enabled the wireless body area network (WBAN) to become a promising networking paradigm. Over the lastExpand
  • 245
  • 12
  • PDF
Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol
TLDR
In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. Expand
  • 55
  • 10
Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks
TLDR
We propose an efficient certificateless public auditing scheme for cloud-assisted WBANs that is provably secure against two types of adversaries. Expand
  • 155
  • 9
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0
TLDR
We present a blockchain-based system for secure mutual authentication, BSeIn, to enforce fine-grained access control polices. Expand
  • 116
  • 9