Follow
Ashok Kumar Das
Ashok Kumar Das
Associate Professor, Center for Security, Theory and Algorithmic Research, IIIT Hyderabad, India
Verified email at iiit.ac.in - Homepage
Title
Cited by
Cited by
Year
A secure biometrics-based multi-server authentication protocol using smart cards
V Odelu, AK Das, A Goswami
IEEE Transactions on Information Forensics and Security 10 (9), 1953-1966, 2015
3672015
Secure signature-based authenticated key establishment scheme for future IoT applications
S Challa, M Wazid, AK Das, N Kumar, AG Reddy, EJ Yoon, KY Yoo
Ieee Access 5, 3028-3043, 2017
3132017
Design of secure user authenticated key management protocol for generic IoT networks
M Wazid, AK Das, V Odelu, N Kumar, M Conti, M Jo
IEEE Internet of Things Journal 5 (1), 269-282, 2017
2802017
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
AK Das
IET Information Security 5 (3), 145-151, 2011
2732011
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
AK Das, P Sharma, S Chatterjee, JK Sing
Journal of Network and Computer Applications 35 (5), 1646-1656, 2012
2422012
Provably secure authenticated key agreement scheme for smart grid
V Odelu, AK Das, M Wazid, M Conti
IEEE Transactions on Smart Grid 9 (3), 1900-1910, 2016
2262016
Secure remote user authenticated key establishment protocol for smart home environment
M Wazid, AK Das, V Odelu, N Kumar, W Susilo
IEEE Transactions on Dependable and Secure Computing 17 (2), 391-406, 2017
2212017
A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards
D Mishra, AK Das, S Mukhopadhyay
Expert Systems with Applications 41 (18), 8129-8143, 2014
2112014
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
S Kumari, M Karuppiah, AK Das, X Li, F Wu, N Kumar
The Journal of Supercomputing 74 (12), 6428-6453, 2018
1822018
A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
AK Das, A Goswami
Journal of medical systems 37 (3), 1-16, 2013
1762013
Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment
S Chatterjee, S Roy, AK Das, S Chattopadhyay, N Kumar, AV Vasilakos
IEEE Transactions on Dependable and Secure Computing 15 (5), 824-839, 2016
1652016
Cloud centric authentication for wearable healthcare monitoring system
J Srinivas, AK Das, N Kumar, JJPC Rodrigues
IEEE Transactions on Dependable and Secure Computing 17 (5), 942-956, 2018
1622018
Design and analysis of secure lightweight remote user authentication and key agreement scheme in Internet of drones deployment
M Wazid, AK Das, N Kumar, AV Vasilakos, JJPC Rodrigues
IEEE Internet of Things Journal 6 (2), 3572-3584, 2018
1592018
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
S Challa, AK Das, V Odelu, N Kumar, S Kumari, MK Khan, AV Vasilakos
Computers & Electrical Engineering 69, 534-554, 2018
1582018
Design of secure and lightweight authentication protocol for wearable devices environment
AK Das, M Wazid, N Kumar, MK Khan, KKR Choo, YH Park
IEEE journal of biomedical and health informatics 22 (4), 1310-1322, 2017
1552017
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
F Wu, L Xu, S Kumari, X Li, J Shen, KKR Choo, M Wazid, AK Das
Journal of Network and Computer Applications 89, 72-85, 2017
1542017
LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment
M Wazid, AK Das, V Bhat, AV Vasilakos
Journal of Network and Computer Applications 150, 102496, 2020
1502020
Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things
S Roy, S Chatterjee, AK Das, S Chattopadhyay, S Kumari, M Jo
IEEE Internet of Things Journal 5 (4), 2884-2895, 2017
1472017
Taxonomy and analysis of security protocols for Internet of Things
AK Das, S Zeadally, D He
Future Generation Computer Systems 89, 110-125, 2018
1462018
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
AK Das
Peer-to-peer Networking and Applications 9 (1), 223-244, 2016
1462016
The system can't perform the operation now. Try again later.
Articles 1–20