Amit K Awasthi (अमित कुमार अवस्थी )
Amit K Awasthi (अमित कुमार अवस्थी )
Verified email at gbu.ac.in - Homepage
Title
Cited by
Cited by
Year
Proxy blind signature scheme
S Lal, AK Awasthi
Cryptology ePrint Archive, Report 72, 2003
1582003
A remote user authentication scheme using smart cards with forward secrecy
AK Awasthi, S Lal
IEEE Transactions on Consumer Electronics 49 (4), 1246-1248, 2003
1452003
ID-based ring signature and proxy ring signature schemes from bilinear pairings
AK Awasthi, S Lal
International Journal of Network Security 4 (2), 187-192, 2005
1432005
Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce
D Mishra, S Mukhopadhyay, S Kumari, MK Khan, A Chaturvedi
Journal of medical systems 38 (5), 41, 2014
1172014
Comment on a dynamic ID-based remote user authentication scheme
AK Awasthi
arXiv preprint cs/0410011, 2004
962004
An enhanced remote user authentication scheme using smart cards
AK Awasthi, S Lal
IEEE Transactions on Consumer Electronics 50 (2), 583-586, 2004
872004
A hash based mutual RFID tag authentication protocol in telecare medicine information system
K Srivastava, AK Awasthi, SD Kaul, RC Mittal
Journal of medical systems 39 (1), 153, 2015
632015
Modeling and analysis of worm propagation in wireless sensor networks
A Singh, AK Awasthi, K Singh, PK Srivastava
Wireless Personal Communications 98 (3), 2535-2551, 2018
302018
Security enhancement of an improved remote user authentication scheme with key agreement
SD Kaul, AK Awasthi
Wireless Personal Communications 89 (2), 621-637, 2016
232016
RFID authentication protocol to enhance patient medication safety
SD Kaul, AK Awasthi
Journal of medical systems 37 (6), 9979, 2013
232013
A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures.
S Lal, AK Awasthi
IACR Cryptol. ePrint Arch. 2003, 73, 2003
152003
On the Authentication of the User from the Remote Autonomous Object.
AK Awasthi
IJ Network Security 1 (3), 166-167, 2005
142005
Security Analysis of A Dynamic ID-based Remote User Authentication Scheme.
AK Awasthi, S Lal
IACR Cryptol. ePrint Arch. 2004, 238, 2004
142004
Quality, reliability, security and robustness in heterogeneous networks
K Singh, A Awasthi
Berlin, Germany: Springer, 2013
112013
An efficient scheme for sensitive message transmission using blind signcryption
AK Awasthi, S Lal
arXiv preprint cs/0504095, 2005
112005
Privacy model for threshold RFID system based on PUF
SD Kaul, AK Awasthi
Wireless Personal Communications 95 (3), 2803-2828, 2017
102017
A new remote user authentication scheme using smart cards with check digits
AK Awasthi
arXiv preprint cs/0504094, 2005
102005
A review on remote user authentication schemes using smart cards
K Srivastava, AK Awasthi, RC Mittal
International Conference on Heterogeneous Networking for Quality …, 2013
92013
A new proxy ring signature scheme
AK Awasthi, S Lal
arXiv preprint cs/0410010, 2004
82004
Biometric based RFID tag mutual authentication protocol defending against illegitimate access
K Srivastava, AK Awasthi, RC Mittal
Malaya Journal of Matematik (MJM) 1, 102-106, 2018
62018
The system can't perform the operation now. Try again later.
Articles 1–20