Mohammad Sabzinejad Farash
Mohammad Sabzinejad Farash
Verified email at khu.ac.ir
Title
Cited by
Cited by
Year
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
MS Farash, M Turkanović, S Kumari, M Hölbl
Ad Hoc Networks 36, 152-176, 2016
3072016
An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
MS Farash, MA Attari
Nonlinear Dynamics 77 (1), 399-411, 2014
1012014
An improved and provably secure privacy preserving authentication protocol for SIP
SA Chaudhry, H Naqvi, M Sher, MS Farash, MU Hassan
Peer-to-Peer Networking and Applications 10 (1), 1-15, 2017
1002017
A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
SA Chaudhry, MS Farash, H Naqvi, M Sher
Electronic Commerce Research 16 (1), 113-139, 2016
962016
An enhanced privacy preserving remote user authentication scheme with provable security
SA Chaudhry, MS Farash, H Naqvi, S Kumari, MK Khan
Security and Communication Networks 8 (18), 3782-3795, 2015
882015
An improved smart card based authentication scheme for session initiation protocol
S Kumari, SA Chaudhry, F Wu, X Li, MS Farash, MK Khan
Peer-to-Peer Networking and Applications 10 (1), 92-105, 2017
862017
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
MS Farash, SA Chaudhry, M Heydari, SM Sajad Sadough, S Kumari, ...
International Journal of Communication Systems 30 (4), e3019, 2017
712017
Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
MS Farash
Peer-to-Peer Networking and Applications 9 (1), 82-91, 2016
682016
An enhanced authenticated key agreement for session initiation protocol
MS Farash, MA Attari
Information Technology and Control 42 (4), 333-342, 2013
612013
A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks
MS Farash, MA Attari
The Journal of Supercomputing 69 (1), 395-411, 2014
592014
Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
MS Farash, MA Attari
Nonlinear Dynamics 76 (2), 1203-1213, 2014
562014
Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
MS Farash
The Journal of Supercomputing 70 (2), 987-1001, 2014
532014
An improved and robust biometrics-based three factor authentication scheme for multiserver environments
SA Chaudhry, H Naqvi, MS Farash, T Shon, M Sher
The Journal of Supercomputing 74 (8), 3504-3520, 2018
422018
A provably secure RFID authentication protocol based on elliptic curve for healthcare environments
MS Farash, O Nawaz, K Mahmood, SA Chaudhry, MK Khan
Journal of medical systems 40 (7), 165, 2016
402016
A Pairing-free ID-based Key Agreement Protocol with Different PKGs.
MS Farash, M Ahmadian-Attari
IJ Network Security 16 (2), 143-148, 2014
392014
An efficient client–client password-based authentication scheme with provable security
MS Farash, MA Attari
The Journal of Supercomputing 70 (2), 1002-1022, 2014
372014
An anonymous and untraceable password‐based authentication scheme for session initiation protocol using smart cards
MS Farash, MA Attari
International Journal of Communication Systems 29 (13), 1956-1967, 2016
362016
An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre
A Irshad, M Sher, SA Chaudhary, H Naqvi, MS Farash
The Journal of Supercomputing 72 (4), 1623-1644, 2016
362016
A robust and efficient privacy aware handover authentication scheme for wireless networks
SA Chaudhry, MS Farash, H Naqvi, SKH Islam, T Shon
Wireless Personal Communications 93 (2), 311-335, 2017
352017
Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography
MS Farash, S Kumari, M Bakhtiari
Multimedia Tools and Applications 75 (8), 4485-4504, 2016
352016
The system can't perform the operation now. Try again later.
Articles 1–20