default search action
SK Hafizul Islam
Person information
- affiliation: Indian Institute of Information Technology Kalyani (IIIT Kalyani), Department of Computer Science and Engineering, India
- affiliation: Birla Institute of Technology and Science Pilani (BITS Pilani), Centre for Software Development, India
- affiliation (PhD 2013): Indian School of Mines (ISM), Dhanbad, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j119]Shukla Mondal, Arup Kumar Pal, SK Hafizul Islam:
CBIF-M: A content-based image filtering and retrieval scheme using multi-classifier filtering framework. Comput. Electr. Eng. 118: 109450 (2024) - [j118]Swagatam Basu, SK Hafizul Islam:
Quantum-attack-resilience OTP-based multi-factor mutual authentication and session key agreement scheme for mobile users. Comput. Electr. Eng. 119: 109495 (2024) - [j117]SK Hafizul Islam, Krittibas Parai, Daya Sagar Gupta:
PF-IBDA: Provably secure and pairing-free identity-based deniable authentication protocol for MANET environments. Comput. Networks 238: 110113 (2024) - [j116]Nimish Mishra, SK Hafizul Islam, Sherali Zeadally:
A survey on security and cryptographic perspective of Industrial-Internet-of-Things. Internet Things 25: 101037 (2024) - [j115]Krittibas Parai, Daya Sagar Gupta, SK Hafizul Islam:
IoT-ID3PAKA: Efficient and Robust ID-3PAKA Protocol for Resource-Constrained IoT Devices. IEEE Internet Things J. 11(6): 10304-10313 (2024) - [j114]Sudeep Ghosh, SK Hafizul Islam, Athanasios V. Vasilakos:
Private Blockchain-Assisted Certificateless Public Key Encryption With Multikeyword Search for Fog-Based IIoT Environments. IEEE Internet Things J. 11(19): 30847-30863 (2024) - [j113]Pramod Kumar, Arup Kumar Pal, SK Hafizul Islam:
2F-MASK-VSS: Two-factor mutual authentication and session key agreement scheme for video surveillance system. J. Syst. Archit. 153: 103196 (2024) - [j112]Sathya Krishnamoorthi, Rajesh Kumar Dhanaraj, SK Hafizul Islam:
CCM-PRNG: Pseudo-random bit generator based on cross-over chaotic map and its application in image encryption. Multim. Tools Appl. 83(34): 80823-80846 (2024) - [j111]Preeti Soni, SK Hafizul Islam, Arup Kumar Pal, Nimish Mishra, Debabrata Samanta:
Blockchain-Based User Authentication and Data-Sharing Framework for Healthcare Industries. IEEE Trans. Netw. Sci. Eng. 11(4): 3623-3638 (2024) - 2023
- [j110]Chiranjeev Bhaya, Arup Kumar Pal, SK Hafizul Islam:
Chapter Four - A novel image encryption and decryption scheme by using DNA computing. Adv. Comput. 129: 129-172 (2023) - [j109]Sourav Saha, Basudeb Bera, Ashok Kumar Das, Neeraj Kumar, SK Hafizul Islam, Youngho Park:
Private Blockchain Envisioned Access Control System for Securing Industrial IoT-Based Pervasive Edge Computing. IEEE Access 11: 130206-130229 (2023) - [j108]Chien-Ming Chen, Shuangshuang Liu, Xuanang Li, SK Hafizul Islam, Ashok Kumar Das:
A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT. J. Syst. Archit. 136: 102831 (2023) - [j107]Krittibas Parai, SK Hafizul Islam:
IoT-RRHM: Provably secure IoT-based real-time remote healthcare monitoring framework. J. Syst. Archit. 138: 102859 (2023) - [j106]Sudeep Ghosh, SK Hafizul Islam, Abhishek Bisht, Ashok Kumar Das:
Provably secure public key encryption with keyword search for data outsourcing in cloud environments. J. Syst. Archit. 139: 102876 (2023) - [j105]Siddhant Thapliyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, SK Hafizul Islam:
Robust authenticated key agreement protocol for internet of vehicles-envisioned intelligent transportation system. J. Syst. Archit. 142: 102937 (2023) - [j104]Rajdeep Chatterjee, Ankita Chatterjee, SK Hafizul Islam, Muhammad Khurram Khan:
An object detection-based few-shot learning approach for multimedia quality assessment. Multim. Syst. 29(5): 2899-2912 (2023) - [j103]Sumit Kumar, Arup Kumar Pal, SK Hafizul Islam, Mohammad Hammoudeh:
Secure and efficient image retrieval through invariant features selection in insecure cloud environments. Neural Comput. Appl. 35(7): 4855-4880 (2023) - [j102]Swagatam Basu, Kübra Seyhan, SK Hafizul Islam, Sedat Akleylek:
MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication. IEEE Syst. J. 17(4): 6093-6103 (2023) - [j101]Preeti Soni, Jitesh Pradhan, Arup Kumar Pal, SK Hafizul Islam:
Cybersecurity Attack-Resilience Authentication Mechanism for Intelligent Healthcare System. IEEE Trans. Ind. Informatics 19(1): 830-840 (2023) - [c20]Layeba Faheem, Soumya Mukherjee, Mohammad S. Obaidat, Arup Kumar Pal, SK Hafizul Islam, Balqies Sadoun:
DL-CMFD: Deep Learning-Based Copy-Move Forgery Detection Using Parallel Feature-Extractor. CITS 2023: 1-8 - [c19]Nimish Mishra, SK Hafizul Islam:
BCTPV-NIZK: Publicly-Verifiable Non-interactive Zero-Knowledge Proof System from Minimal Blockchain Assumptions. ICISS 2023: 380-395 - 2022
- [b1]Sanjay Chakraborty, SK Hafizul Islam, Debabrata Samanta:
Data Classification and Incremental Clustering in Data Mining and Machine Learning. Springer 2022, ISBN 978-3-030-93087-5, pp. 1-193 - [j100]Rajdeep Chatterjee, Ankita Chatterjee, SK Hafizul Islam:
Deep learning techniques for observing the impact of the global warming from satellite images of water-bodies. Multim. Tools Appl. 81(5): 6115-6130 (2022) - [j99]Sumit Kumar, Jitesh Pradhan, Arup Kumar Pal, SK Hafizul Islam, Muhammad Khurram Khan:
Radiological image retrieval technique using multi-resolution texture and shape features. Multim. Tools Appl. 81(10): 13633-13660 (2022) - [j98]Mukul Majhi, Arup Kumar Pal, Jitesh Pradhan, SK Hafizul Islam, Muhammad Khurram Khan:
Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications. Multim. Tools Appl. 81(29): 41545-41577 (2022) - [j97]Rajesh Kumar Dhanaraj, SK Hafizul Islam, Vani Rajasekar:
A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments. Wirel. Networks 28(7): 3127-3142 (2022) - [c18]Abhijit Guha, Mohammad S. Obaidat, Debabrata Samanta, SK Hafizul Islam:
Clustering-based Optimal Resource Allocation Strategy in Title Insurance Underwriting. CITS 2022: 1-5 - 2021
- [j96]Mukul Majhi, Arup Kumar Pal, SK Hafizul Islam, Muhammad Khurram Khan:
Secure content-based image retrieval using modified Euclidean distance for encrypted features. Trans. Emerg. Telecommun. Technol. 32(2) (2021) - [j95]Muhammad Asad Saleem, SK Hafizul Islam, Shafiq Ahmed, Khalid Mahmood, Majid Hussain:
Provably secure biometric-based client-server secure communication over unreliable networks. J. Inf. Secur. Appl. 58: 102769 (2021) - [j94]Nimish Mishra, SK Hafizul Islam, Sherali Zeadally:
A comprehensive review on collision-resistant hash functions on lattices. J. Inf. Secur. Appl. 58: 102782 (2021) - [j93]Kübra Seyhan, Tu N. Nguyen, Sedat Akleylek, Korhan Cengiz, SK Hafizul Islam:
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security. J. Inf. Secur. Appl. 58: 102788 (2021) - [j92]Preeti Soni, Arup Kumar Pal, SK Hafizul Islam, Aadarsh Singh, Priyanshu Kumar:
Provably secure and biometric-based secure access of e-Governance services using mobile devices. J. Inf. Secur. Appl. 63: 103016 (2021) - [j91]SK Hafizul Islam, Swagatam Basu:
PB-3PAKA: Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments. J. Inf. Secur. Appl. 63: 103026 (2021) - [j90]Mahdi Nikooghadam, Haleh Amintoosi, SK Hafizul Islam, Mostafa Farhadi Moghadam:
A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance. J. Syst. Archit. 115: 101955 (2021) - [j89]Eric Ke Wang, Ship Peng Xu, Chien-Ming Chen, SK Hafizul Islam, Mohammad Mehedi Hassan, Claudio Savaglio, Pasquale Pace, Gianluca Aloi:
A Trusted Consensus Scheme for Collaborative Learning in the Edge AI Computing Domain. IEEE Netw. 35(1): 204-210 (2021) - [j88]Tsu-Yang Wu, Lei Yang, Zhiyuan Lee, Chien-Ming Chen, Jeng-Shyang Pan, SK Hafizul Islam:
Improved ECC-Based Three-Factor Multiserver Authentication Scheme. Secur. Commun. Networks 2021: 6627956:1-6627956:14 (2021) - [j87]Mahammad Shareef Mekala, Rizwan Patan, SK Hafizul Islam, Debabrata Samanta, Ghulam Ali Mallah, Shehzad Ashraf Chaudhry:
DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre. Secur. Commun. Networks 2021: 6688162:1-6688162:16 (2021) - [j86]Daya Sagar Gupta, SK Hafizul Islam, Mohammad S. Obaidat, Pandi Vijayakumar, Neeraj Kumar, YoHan Park:
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments. IEEE Syst. J. 15(2): 1732-1741 (2021) - [j85]Daya Sagar Gupta, SK Hafizul Islam, Mohammad S. Obaidat, Arijit Karati, Balqies Sadoun:
LAAC: Lightweight Lattice-Based Authentication and Access Control Protocol for E-Health Systems in IoT Environments. IEEE Syst. J. 15(3): 3620-3627 (2021) - [j84]Arijit Karati, Ruhul Amin, SK Hafizul Islam, Kim-Kwang Raymond Choo:
Provably Secure and Lightweight Identity-Based Authenticated Data Sharing Protocol for Cyber-Physical Cloud Environment. IEEE Trans. Cloud Comput. 9(1): 318-330 (2021) - [j83]Chien-Ming Chen, Xiaoting Deng, Wensheng Gan, Jiahui Chen, SK Hafizul Islam:
A secure blockchain-based group key agreement protocol for IoT. J. Supercomput. 77(8): 9046-9068 (2021) - [j82]Muhammad Umar, SK Hafizul Islam, Khalid Mahmood, Shafiq Ahmed, Zahid Ghaffar, Muhammad Asad Saleem:
Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF. IEEE Trans. Veh. Technol. 70(11): 12158-12167 (2021) - [c17]Rajdeep Chatterjee, Soham Roy, SK Hafizul Islam:
Trident U-Net: An Encoder Fusion for Improved Biomedical Image Segmentation. BIOMESIP 2021: 141-154 - [c16]Kajal Chatterjee, Mohammad S. Obaidat, Debabrata Samanta, Balqies Sadoun, SK Hafizul Islam, Rajdeep Chatterjee:
Classification of Soil Images using Convolution Neural Networks. CCCI 2021: 1-5 - [c15]Kajal Chatterjee, Mohammad S. Obaidat, Debabrata Samanta, SK Hafizul Islam, Niju P. Joseph:
Machine Learning-based Currency Information Retrieval for Aiding the Visually Impaired People. CITS 2021: 1-5 - [c14]Daya Sagar Gupta, Krittibas Parai, Mohammad S. Obaidat, SK Hafizul Islam:
Efficient and Secure Design of ID-3PAKA Protocol Using ECC. CITS 2021: 1-5 - [c13]Chien-Ming Chen, Zhuoyu Tie, Eric Ke Wang, Kuo-Hui Yeh, Wensheng Gan, SK Hafizul Islam:
A Reinforced Dynamic Multi-keyword Ranked Search with Forward Privacy. DSC 2021: 1-8 - [c12]Chiranjeev Bhaya, Mohammad S. Obaidat, Arup Kumar Pal, SK Hafizul Islam:
Encrypted Medical Image Storage in DNA Domain. ICC 2021: 1-7 - 2020
- [j81]Zahid Ghaffar, Shafiq Ahmed, Khalid Mahmood, SK Hafizul Islam, Mohammad Mehedi Hassan, Giancarlo Fortino:
An Improved Authentication Scheme for Remote Data Access and Sharing Over Cloud Storage in Cyber-Physical-Social-Systems. IEEE Access 8: 47144-47160 (2020) - [j80]Kuo-Hui Yeh, Weizhi Meng, SK Hafizul Islam, Kuan Zhang, Ennan Zhai:
IEEE Access Special Section Editorial: Security and Privacy for Cloud and IoT. IEEE Access 8: 219690-219694 (2020) - [j79]Daya Sagar Gupta, SK Hafizul Islam, Mohammad S. Obaidat, Kuei-Fang Hsiao:
A Novel Identity-based Deniable Authentication Protocol Using Bilinear Pairings for Mobile Ad Hoc Networks. Ad Hoc Sens. Wirel. Networks 47(1-4): 227-247 (2020) - [j78]Khalid Mahmood, Waseem Akram, Akasha Shafiq, Izwa Altaf, Muhammad Ali Lodhi, SK Hafizul Islam:
An enhanced and provably secure multi-factor authentication scheme for Internet-of-Multimedia-Things environments. Comput. Electr. Eng. 88: 106888 (2020) - [j77]SK Hafizul Islam:
Provably secure two-party authenticated key agreement protocol for post-quantum environments. J. Inf. Secur. Appl. 52: 102468 (2020) - [j76]Zeeshan Ali, Anwar Ghani, Imran Khan, Shehzad Ashraf Chaudhry, SK Hafizul Islam, Debasis Giri:
A robust authentication and access control protocol for securing wireless healthcare sensor networks. J. Inf. Secur. Appl. 52: 102502 (2020) - [j75]SK Hafizul Islam, Sherali Zeadally:
Provably secure identity-based two-party authenticated key agreement protocol based on CBi-ISIS and Bi-ISIS problems on lattices. J. Inf. Secur. Appl. 54: 102540 (2020) - [j74]Pandit Byomakesha Dash, Janmenjoy Nayak, Bighnaraj Naik, Etuari Oram, SK Hafizul Islam:
Model based IoT security framework using multiclass adaptive boosting with SMOTE. Secur. Priv. 3(5) (2020) - [j73]Muhammad Faizan Ayub, Salman Shamshad, Khalid Mahmood, SK Hafizul Islam, Reza M. Parizi, Kim-Kwang Raymond Choo:
A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices. IEEE Trans. Consumer Electron. 66(4): 396-405 (2020) - [j72]Bighnaraj Naik, Mohammad S. Obaidat, Janmenjoy Nayak, Danilo Pelusi, Pandi Vijayakumar, SK Hafizul Islam:
Intelligent Secure Ecosystem Based on Metaheuristic and Functional Link Neural Network for Edge of Things. IEEE Trans. Ind. Informatics 16(3): 1947-1956 (2020) - [j71]Pandi Vijayakumar, Mohammad S. Obaidat, Maria Azees, SK Hafizul Islam, Neeraj Kumar:
Efficient and Secure Anonymous Authentication With Location Privacy for IoT-Based WBANs. IEEE Trans. Ind. Informatics 16(4): 2603-2611 (2020) - [j70]Fagen Li, Jiye Wang, Yuyang Zhou, Chunhua Jin, SK Hafizul Islam:
A heterogeneous user authentication and key establishment for mobile client-server environment. Wirel. Networks 26(2): 913-924 (2020) - [c11]Jitesh Pradhan, Arup Kumar Pal, Mohammad S. Obaidat, SK Hafizul Islam:
A Post Dynamic Clustering Approach for Classification-based Image Retrieval. CCCI 2020: 1-7 - [c10]Rifaqat Ali, Preeti Chandrakar, Mohammad S. Obaidat, Kuei-Fang Hsiao, Arup Kumar Pal, SK Hafizul Islam:
A Secure Authentication Mechanism for Wireless Sensor Networks. CITS 2020: 1-8
2010 – 2019
- 2019
- [j69]Jimmy Ming-Tai Wu, Meng-Hsiun Tsai, Yong Zhi Huang, SK Hafizul Islam, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi, Giancarlo Fortino:
Applying an ensemble convolutional neural network with Savitzky-Golay filter to construct a phonocardiogram prediction model. Appl. Soft Comput. 78: 29-40 (2019) - [j68]Preeti Soni, Arup Kumar Pal, SK Hafizul Islam:
An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system. Comput. Methods Programs Biomed. 182 (2019) - [j67]Marko Kompara, SK Hafizul Islam, Marko Hölbl:
A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs. Comput. Networks 148: 196-213 (2019) - [j66]Pandi Vijayakumar, S. Milton Ganesh, Lazarus Jegatha Deborah, SK Hafizul Islam, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi, Giancarlo Fortino:
MGPV: A novel and efficient scheme for secure data sharing among mobile users in the public cloud. Future Gener. Comput. Syst. 95: 560-569 (2019) - [j65]Rajdeep Chatterjee, Tanmoy Maitra, SK Hafizul Islam, Mohammad Mehedi Hassan, Atif Alamri, Giancarlo Fortino:
A novel machine learning based feature selection for motor imagery EEG signal classification in Internet of medical things environment. Future Gener. Comput. Syst. 98: 419-434 (2019) - [j64]P. Punithavathi, S. Geetha, Marimuthu Karuppiah, SK Hafizul Islam, Mohammad Mehedi Hassan, Kim-Kwang Raymond Choo:
A lightweight machine learning-based authentication framework for smart IoT devices. Inf. Sci. 484: 255-268 (2019) - [j63]K. Selvakumar, Marimuthu Karuppiah, L. Sai Ramesh, SK Hafizul Islam, Mohammad Mehedi Hassan, Giancarlo Fortino, Kim-Kwang Raymond Choo:
Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs. Inf. Sci. 497: 77-90 (2019) - [j62]Marimuthu Karuppiah, Mohammad S. Obaidat, SK Hafizul Islam, Pandi Vijayakumar:
Security analysis on "mutual authentication scheme for multimedia medical information systems". Secur. Priv. 2(3) (2019) - [j61]Ruhul Amin, SK Hafizul Islam, Prosanta Gope, Kim-Kwang Raymond Choo, Nachiket Tapas:
Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System. IEEE J. Biomed. Health Informatics 23(4): 1749-1759 (2019) - [j60]Pankaj Kumar Sa, Saru Kumari, Vishnu Sharma, Xiong Li, Arun Kumar Sangaiah, SK Hafizul Islam:
Secure CLS and CL-AS schemes designed for VANETs. J. Supercomput. 75(6): 3076-3098 (2019) - [c9]Daya Sagar Gupta, SK Hafizul Islam, Mohammad S. Obaidat:
A Secure Identity-based Deniable Authentication Protocol for MANETs. CITS 2019: 1-5 - 2018
- [j59]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Mohammad S. Obaidat:
A robust mutual authentication protocol for WSN with multiple base-stations. Ad Hoc Networks 75-76: 1-18 (2018) - [j58]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Neeraj Kumar:
A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener. Comput. Syst. 80: 483-495 (2018) - [j57]Prosanta Gope, Ruhul Amin, SK Hafizul Islam, Neeraj Kumar, Vinod Kumar Bhalla:
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Gener. Comput. Syst. 83: 629-637 (2018) - [j56]SK Hafizul Islam, Mohammad S. Obaidat, Pandi Vijayakumar, Enas W. Abdulhay, Fagen Li, M. Krishna Chaitanya Reddy:
A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs. Future Gener. Comput. Syst. 84: 216-227 (2018) - [j55]Sayantani Basu, Marimuthu Karuppiah, K. Selvakumar, Kuan-Ching Li, SK Hafizul Islam, Mohammad Mehedi Hassan, Md. Zakirul Alam Bhuiyan:
An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment. Future Gener. Comput. Syst. 88: 254-261 (2018) - [j54]SK Hafizul Islam, Ashok Kumar Das, Muhammad Khurram Khan:
A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractor. Int. J. Ad Hoc Ubiquitous Comput. 27(2): 138-155 (2018) - [j53]Prosanta Gope, SK Hafizul Islam, Mohammad S. Obaidat, Ruhul Amin, Pandi Vijayakumar:
Anonymous and expeditious mobile user authentication scheme for GLOMONET environments. Int. J. Commun. Syst. 31(2) (2018) - [j52]Deepanramkumar P., Marimuthu Karuppiah, SK Hafizul Islam, Mohammad S. Obaidat:
Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES. Int. J. Commun. Syst. 31(17) (2018) - [j51]Arijit Karati, SK Hafizul Islam, G. P. Biswas, Md. Zakirul Alam Bhuiyan, Pandi Vijayakumar, Marimuthu Karuppiah:
Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments. IEEE Internet Things J. 5(4): 2904-2914 (2018) - [j50]SK Hafizul Islam, Pandi Vijayakumar, Md. Zakirul Alam Bhuiyan, Ruhul Amin, Varun Rajeev M., Balamurugan Balusamy:
A Provably Secure Three-Factor Session Initiation Protocol for Multimedia Big Data Communications. IEEE Internet Things J. 5(5): 3408-3418 (2018) - [j49]Arijit Karati, SK Hafizul Islam, G. P. Biswas:
A pairing-free and provably secure certificateless signature scheme. Inf. Sci. 450: 378-391 (2018) - [j48]Ruhul Amin, SK Hafizul Islam, Neeraj Kumar, Kim-Kwang Raymond Choo:
An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks. J. Netw. Comput. Appl. 104: 133-144 (2018) - [j47]Saru Kumari, Ashok Kumar Das, Xiong Li, Fan Wu, Muhammad Khurram Khan, Qi Jiang, SK Hafizul Islam:
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments. Multim. Tools Appl. 77(2): 2359-2389 (2018) - [j46]Ruhul Amin, SK Hafizul Islam, Pandi Vijayakumar, Muhammad Khurram Khan, Victor Chang:
A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication. Multim. Tools Appl. 77(9): 11041-11066 (2018) - [j45]Dheerendra Mishra, Pandi Vijayakumar, Venkatasamy Sureshkumar, Ruhul Amin, SK Hafizul Islam, Prosanta Gope:
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multim. Tools Appl. 77(14): 18295-18325 (2018) - [j44]Shobhit Sinha, SK Hafizul Islam, Mohammad S. Obaidat:
A comparative study and analysis of some pseudorandom number generator algorithms. Secur. Priv. 1(6) (2018) - [j43]Arijit Karati, SK Hafizul Islam, Marimuthu Karuppiah:
Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments. IEEE Trans. Ind. Informatics 14(8): 3701-3711 (2018) - [c8]Joy Dutta, Yong Wang, Tanmoy Maitra, SK Hafizul Islam, Bharat S. Rawal, Debasis Giri:
ES3B: Enhanced Security System for Smart Building Using IoT. SmartCloud 2018: 158-165 - 2017
- [j42]SK Hafizul Islam, Mohammad Sabzinejad Farash, G. P. Biswas, Muhammad Khurram Khan, Mohammad S. Obaidat:
A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography. Int. J. Comput. Math. 94(1): 39-55 (2017) - [j41]Tanmoy Maitra, Mohammad S. Obaidat, Ruhul Amin, SK Hafizul Islam, Shehzad Ashraf Chaudhry, Debasis Giri:
A robust ElGamal-based password-authentication protocol using smart card for client-server communication. Int. J. Commun. Syst. 30(11) (2017) - [j40]Ruhul Amin, SK Hafizul Islam, Mohammad S. Obaidat, G. P. Biswas, Kuei-Fang Hsiao:
An anonymous and robust multi-server authentication protocol using multiple registration servers. Int. J. Commun. Syst. 30(18) (2017) - [j39]Mohammad Sabzinejad Farash, Shehzad Ashraf Chaudhry, SK Hafizul Islam, Muazzam Ali Khan Khattak, Aiiad Albeshri:
Security Vulnerabilities and Improvements of SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks. Inf. Technol. Control. 46(2): 205-218 (2017) - [j38]SK Hafizul Islam, G. P. Biswas:
A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication. J. King Saud Univ. Comput. Inf. Sci. 29(1): 63-73 (2017) - [j37]SK Hafizul Islam, Ruhul Amin, G. P. Biswas, Mohammad Sabzinejad Farash, Xiong Li, Saru Kumari:
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. J. King Saud Univ. Comput. Inf. Sci. 29(3): 311-324 (2017) - [j36]Ruhul Amin, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri, Saru Kumari:
A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments. Secur. Commun. Networks 2017: 5989151:1-5989151:15 (2017) - [j35]Ruhul Amin, R. Simon Sherratt, Debasis Giri, SK Hafizul Islam, Muhammad Khurram Khan:
A software agent enabled biometric security algorithm for secure file access in consumer storage devices. IEEE Trans. Consumer Electron. 63(1): 53-61 (2017) - [j34]Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Husnain Naqvi, SK Hafizul Islam, Taeshik Shon:
A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks. Wirel. Pers. Commun. 93(2): 311-335 (2017) - [j33]Xiong Li, Saru Kumari, Jian Shen, Fan Wu, Cai-Sen Chen, SK Hafizul Islam:
Secure Data Access and Sharing Scheme for Cloud Storage. Wirel. Pers. Commun. 96(4): 5295-5314 (2017) - [c7]SK Hafizul Islam, Mohammad S. Obaidat, Varun Rajeev M., Ruhul Amin:
Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme. ICMC 2017: 3-15 - 2016
- [j32]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Lu Leng, Neeraj Kumar:
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput. Networks 101: 42-62 (2016) - [j31]SK Hafizul Islam, Mohammad S. Obaidat, Ruhul Amin:
An anonymous and provably secure authentication scheme for mobile user. Int. J. Commun. Syst. 29(9): 1529-1544 (2016) - [j30]SK Hafizul Islam:
Design and analysis of an improved smartcard-based remote user password authentication scheme. Int. J. Commun. Syst. 29(11): 1708-1719 (2016) - [j29]SK Hafizul Islam, Muhammad Khurram Khan:
Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks. Int. J. Commun. Syst. 29(17): 2442-2456 (2016) - [j28]SK Hafizul Islam, Ashok Kumar Das, Muhammad Khurram Khan:
Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor. Secur. Commun. Networks 9(16): 3229-3238 (2016) - [j27]Pandi Vijayakumar, Ramu Naresh, Lazarus Jegatha Deborah, SK Hafizul Islam:
An efficient group key agreement protocol for secure P2P communication. Secur. Commun. Networks 9(17): 3952-3965 (2016) - [j26]Tanmoy Maitra, Mohammad S. Obaidat, SK Hafizul Islam, Debasis Giri, Ruhul Amin:
Security analysis and design of an efficient ECC-based two-factor password authentication scheme. Secur. Commun. Networks 9(17): 4166-4181 (2016) - [j25]Tanmoy Maitra, SK Hafizul Islam, Ruhul Amin, Debasis Giri, Muhammad Khurram Khan, Neeraj Kumar:
An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design. Secur. Commun. Networks 9(17): 4615-4638 (2016) - [j24]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Debasis Giri, Muhammad Khurram Khan, Neeraj Kumar:
A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments. Secur. Commun. Networks 9(17): 4650-4666 (2016) - [j23]Pandi Vijayakumar, Ramu Naresh, SK Hafizul Islam, Lazarus Jegatha Deborah:
An effective key distribution for secure internet pay-TV using access key hierarchies. Secur. Commun. Networks 9(18): 5085-5097 (2016) - [j22]Xiong Li, Jianwei Niu, Saru Kumari, SK Hafizul Islam, Fan Wu, Muhammad Khurram Khan, Ashok Kumar Das:
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security. Wirel. Pers. Commun. 89(2): 569-597 (2016) - [c6]Ruhul Amin, SK Hafizul Islam, Arijit Karati, G. P. Biswas:
Design of an enhanced authentication protocol and its verification using AVISPA. RAIT 2016: 404-409 - 2015
- [j21]SK Hafizul Islam, Fagen Li:
Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings. Comput. J. 58(10): 2636-2648 (2015) - [j20]Mohammad Sabzinejad Farash, SK Hafizul Islam, Mohammad S. Obaidat:
A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks. Concurr. Comput. Pract. Exp. 27(17): 4897-4913 (2015) - [j19]SK Hafizul Islam:
Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps. Inf. Sci. 312: 104-130 (2015) - [j18]SK Hafizul Islam, G. P. Biswas:
Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system. J. King Saud Univ. Comput. Inf. Sci. 27(2): 211-221 (2015) - [j17]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Mohammad S. Obaidat:
Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System. J. Medical Syst. 39(11): 137:1-137:20 (2015) - [j16]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Xiong Li:
Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems. J. Medical Syst. 39(11): 140:1-140:21 (2015) - [j15]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Neeraj Kumar:
An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography. J. Medical Syst. 39(11): 180 (2015) - [j14]SK Hafizul Islam, Muhammad Khurram Khan, Ali M. Al-Khouri:
Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Secur. Commun. Networks 8(13): 2214-2231 (2015) - [j13]SK Hafizul Islam, Mohammad S. Obaidat:
Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing. Secur. Commun. Networks 8(18): 4319-4332 (2015) - [j12]SK Hafizul Islam, G. P. Biswas:
Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys. Wirel. Pers. Commun. 82(4): 2727-2750 (2015) - [j11]SK Hafizul Islam, Muhammad Khurram Khan, Mohammad S. Obaidat, Fahad T. Bin Muhaya:
Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps. Wirel. Pers. Commun. 84(3): 2013-2034 (2015) - [j10]SK Hafizul Islam, Abhishek Singh:
Provably secure one-round certificateless authenticated group key agreement protocol for secure communications. Wirel. Pers. Commun. 85(3): 879-898 (2015) - [c5]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan:
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks. CyberSA 2015: 1-7 - 2014
- [j9]SK Hafizul Islam, G. P. Biswas:
A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings. J. King Saud Univ. Comput. Inf. Sci. 26(1): 55-67 (2014) - [j8]SK Hafizul Islam, G. P. Biswas:
Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings. J. King Saud Univ. Comput. Inf. Sci. 26(1): 89-97 (2014) - [j7]SK Hafizul Islam, Muhammad Khurram Khan:
Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems. J. Medical Syst. 38(10): 135 (2014) - [j6]SK Hafizul Islam:
A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL Attack. Wirel. Pers. Commun. 79(3): 1975-1991 (2014) - [c4]Manoj K. Mishra, SK Hafizul Islam, G. P. Biswas:
Design of ECC-Based ElGamal Encryption Scheme Using CL-PKC. RAIT 2014: 27-34 - [i2]SK Hafizul Islam:
Identity-based encryption and digital signature schemes using extended chaotic maps. IACR Cryptol. ePrint Arch. 2014: 275 (2014) - [i1]SK Hafizul Islam:
Design of identity-based digital signature schemes using extended chaotic maps. IACR Cryptol. ePrint Arch. 2014: 276 (2014) - 2013
- [j5]SK Hafizul Islam, G. P. Biswas:
Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography. Int. J. Comput. Math. 90(11): 2244-2258 (2013) - [j4]SK Hafizul Islam, G. P. Biswas:
Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings. J. King Saud Univ. Comput. Inf. Sci. 25(1): 51-61 (2013) - [j3]SK Hafizul Islam, G. P. Biswas:
Design of improved password authentication and update scheme based on elliptic curve cryptography. Math. Comput. Model. 57(11-12): 2703-2717 (2013) - 2012
- [j2]SK Hafizul Islam, G. P. Biswas:
A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks. Ann. des Télécommunications 67(11-12): 547-558 (2012) - [c3]SK Hafizul Islam, G. P. Biswas:
Certificateless strong designated verifier multisignature scheme using bilinear pairings. ICACCI 2012: 540-546 - [c2]SK Hafizul Islam, G. P. Biswas:
Design of an efficient ID-based short designated verifier proxy signature scheme. RAIT 2012: 48-53 - 2011
- [j1]SK Hafizul Islam, G. P. Biswas:
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11): 1892-1898 (2011) - [c1]SK Hafizul Islam, G. P. Biswas:
Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment. ACC (2) 2011: 628-635
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint