Amit K Awasthi (अमित कुमार अवस्थी )
Amit K Awasthi (अमित कुमार अवस्थी )
Verified email at gbu.ac.in - Homepage
TitleCited byYear
Proxy blind signature scheme
S Lal, AK Awasthi
Cryptology ePrint Archive, Report 72, 2003
1542003
ID-based ring signature and proxy ring signature schemes from bilinear pairings
AK Awasthi, S Lal
International Journal of Network Security 4 (2), 187-192, 2005
1422005
A remote user authentication scheme using smart cards with forward secrecy
AK Awasthi, S Lal
IEEE Transactions on Consumer Electronics 49 (4), 1246-1248, 2003
1402003
Comment on a dynamic ID-based remote user authentication scheme
AK Awasthi
arXiv preprint cs/0410011, 2004
952004
An enhanced remote user authentication scheme using smart cards
AK Awasthi, S Lal
IEEE Transactions on Consumer Electronics 50 (2), 583-586, 2004
872004
A biometric authentication scheme for telecare medicine information systems with nonce
AK Awasthi, K Srivastava
Journal of medical systems 37 (5), 9964, 2013
682013
A hash based mutual RFID tag authentication protocol in telecare medicine information system
K Srivastava, AK Awasthi, SD Kaul, RC Mittal
Journal of medical systems 39 (1), 153, 2015
492015
RFID authentication protocol to enhance patient medication safety
SD Kaul, AK Awasthi
Journal of medical systems 37 (6), 9979, 2013
212013
Modeling and analysis of worm propagation in wireless sensor networks
A Singh, AK Awasthi, K Singh, PK Srivastava
Wireless Personal Communications 98 (3), 2535-2551, 2018
202018
Security Analysis of A Dynamic ID-based Remote User Authentication Scheme.
AK Awasthi, S Lal
IACR Cryptology ePrint Archive 2004, 238, 2004
152004
On the Authentication of the User from the Remote Autonomous Object.
AK Awasthi
IJ Network Security 1 (3), 166-167, 2005
142005
A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures.
S Lal, AK Awasthi
IACR Cryptology ePrint Archive 2003, 73, 2003
142003
Security enhancement of an improved remote user authentication scheme with key agreement
SD Kaul, AK Awasthi
Wireless Personal Communications 89 (2), 621-637, 2016
132016
Quality, reliability, security and robustness in heterogeneous networks
K Singh, A Awasthi
Berlin, Germany: Springer, 2013
112013
An efficient scheme for sensitive message transmission using blind signcryption
AK Awasthi, S Lal
arXiv preprint cs/0504095, 2005
112005
A new remote user authentication scheme using smart cards with check digits
AK Awasthi
arXiv preprint cs/0504094, 2005
92005
A review on remote user authentication schemes using smart cards
K Srivastava, AK Awasthi, RC Mittal
International Conference on Heterogeneous Networking for Quality …, 2013
82013
A new proxy ring signature scheme
AK Awasthi, S Lal
arXiv preprint cs/0410010, 2004
82004
Privacy model for threshold RFID system based on PUF
SD Kaul, AK Awasthi
Wireless Personal Communications 95 (3), 2803-2828, 2017
72017
Lightweight multilevel key management scheme for large scale wireless sensor network
A Singh, AK Awasthi, K Singh
2016 3rd International Conference on Computing for Sustainable Global …, 2016
52016
The system can't perform the operation now. Try again later.
Articles 1–20