Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things AK Maurya, VN Sastry Information 8 (4), 136, 2017 | 38 | 2017 |
A robust user authentication protocol with privacy-preserving for roaming service in mobility environments R Shashidhara, S Bojjagani, AK Maurya, S Kumari, H Xiong Peer-to-peer networking and applications 13 (6), 1943-1966, 2020 | 29 | 2020 |
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters AK Maurya, AK Das, SS Jamal, D Giri Journal of Systems Architecture 120, 102296, 2021 | 22 | 2021 |
Cryptanalysis and improvement of ECC-based security enhanced user authentication protocol for wireless sensor networks AK Maurya, VN Sastry, SK Udgata Security in Computing and Communications: Third International Symposium …, 2015 | 6 | 2015 |
A Score-Level Fusion Method for Protecting Fingerprint and Palmprint Templates M Sandhya, YS Rao, S Biswajeet, VD Kumar, MA Kumar Security and Privacy: Select Proceedings of ICSP 2020 744, 1, 2021 | 5 | 2021 |
Secure and efficient authenticated key exchange mechanism for wireless sensor networks and internet of things using bloom filter AK Maurya, VN Sastry 2017 IEEE 3rd International Conference on Collaboration and Internet …, 2017 | 4 | 2017 |
The use of iot-based wearable devices to ensure secure lightweight payments in fintech applications S Bojjagani, NR Seelam, NK Sharma, R Uyyala, SRCM Akuri, AK Maurya Journal of King Saud University-Computer and Information Sciences 35 (9), 101785, 2023 | 3 | 2023 |
User authentication scheme for wireless sensor networks and Internet of Things using Chinese remainder theorem AK Maurya, VN Sastry Security in Computing and Communications: 5th International Symposium, SSCC …, 2017 | 2 | 2017 |
Symmetric hash function based secure and efficient authenticated key exchange mechanism for wireless sensor networks AK Maurya, VN Sastry 2017 IEEE International Conference on Advanced Networks and …, 2017 | 1 | 2017 |
A Novel Energy Efficient Multi-Dimensional Virtual Machines Allocation and Migration at the Cloud Data Center NK Sharma, S Bojjagani, YCAP Reddy, M Vivekanandan, J Srinivasan, ... IEEE Access, 2023 | | 2023 |
User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition AK Maurya, VN Sastry Security in Computing and Communications: 5th International Symposium, SSCC …, 2017 | | 2017 |