Follow
Saru Kumari
Saru Kumari
Associate Professor, Department of Mathematics, Ch. Charan Singh University, Meerut
Verified email at ccsuniversity.ac.in - Homepage
Title
Cited by
Cited by
Year
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
MS Farash, M Turkanović, S Kumari, M Hölbl
Ad Hoc Networks 36, 152-176, 2016
4412016
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
X Li, J Niu, S Kumari, F Wu, AK Sangaiah, KKR Choo
Journal of Network and Computer Applications 103, 194-204, 2018
3082018
A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things
X Li, J Niu, MZA Bhuiyan, F Wu, M Karuppiah, S Kumari
IEEE Transactions on Industrial Informatics 14 (8), 3599-3609, 2017
2982017
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta, KKR Choo
Computer Networks 129, 429-443, 2017
2512017
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
K Mahmood, SA Chaudhry, H Naqvi, S Kumari, X Li, AK Sangaiah
Future Generation Computer Systems 81, 557-565, 2018
2272018
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
S Kumari, M Karuppiah, AK Das, X Li, F Wu, N Kumar
The Journal of Supercomputing 74, 6428-6453, 2018
2042018
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
F Wu, X Li, AK Sangaiah, L Xu, S Kumari, L Wu, J Shen
Future Generation Computer Systems 82, 727-737, 2018
1802018
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
S Challa, AK Das, V Odelu, N Kumar, S Kumari, MK Khan, AV Vasilakos
Computers & Electrical Engineering 69, 534-554, 2018
1792018
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
F Wu, L Xu, S Kumari, X Li, J Shen, KKR Choo, M Wazid, AK Das
Journal of Network and Computer Applications 89, 72-85, 2017
1722017
Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things
S Roy, S Chatterjee, AK Das, S Chattopadhyay, S Kumari, M Jo
IEEE Internet of Things Journal 5 (4), 2884-2895, 2017
1672017
User authentication schemes for wireless sensor networks: A review
S Kumari, MK Khan, M Atiquzzaman
Ad Hoc Networks 27, 159-194, 2015
1642015
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
S Kumari, X Li, F Wu, AK Das, H Arshad, MK Khan
Future Generation Computer Systems 63, 56-75, 2016
1572016
Design of a provably secure biometrics-based multi-cloud-server authentication scheme
S Kumari, X Li, F Wu, AK Das, KKR Choo, J Shen
Future Generation Computer Systems 68, 320-330, 2017
1532017
Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce
D Mishra, S Mukhopadhyay, S Kumari, MK Khan, A Chaturvedi
Journal of medical systems 38, 1-11, 2014
1492014
Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications
X Li, S Liu, F Wu, S Kumari, JJPC Rodrigues
IEEE Internet of Things Journal 6 (3), 4755-4763, 2018
1462018
An improved remote user authentication scheme with key agreement
S Kumari, MK Khan, X Li
Computers & Electrical Engineering 40 (6), 1997-2012, 2014
1372014
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security
F Wu, L Xu, S Kumari, X Li
Journal of Ambient Intelligence and Humanized Computing 8, 101-116, 2017
1312017
Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices
S Qiu, D Wang, G Xu, S Kumari
IEEE Transactions on Dependable and Secure Computing 19 (2), 1338-1351, 2020
1272020
PoRX: A reputation incentive scheme for blockchain consensus of IIoT
EK Wang, Z Liang, CM Chen, S Kumari, MK Khan
Future Generation Computer Systems 102, 140-151, 2020
1262020
A secure authenticated and key exchange scheme for fog computing
CM Chen, Y Huang, KH Wang, S Kumari, ME Wu
Enterprise Information Systems 15 (9), 1200-1215, 2021
1252021
The system can't perform the operation now. Try again later.
Articles 1–20