A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring R Ali, AK Pal, S Kumari, M Karuppiah, M Conti Future Generation Computer Systems, 2018 | 156 | 2018 |
An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring R Ali, AK Pal, S Kumari, AK Sangaiah, X Li, F Wu Journal of Ambient Intelligence and Humanized Computing, 1-22, 2018 | 61 | 2018 |
An efficient three factor–based authentication scheme in multiserver environment using ECC R Ali, AK Pal International Journal of Communication Systems 31 (4), e3484, 2018 | 53 | 2018 |
Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment R Ali, AK Pal Arabian Journal for Science and Engineering, 1-18, 2017 | 34 | 2017 |
Cloud-based authenticated protocol for healthcare monitoring system P Chandrakar, S Sinha, R Ali Journal of Ambient Intelligence and Humanized Computing, 1-17, 2020 | 25 | 2020 |
Cryptanalysis and biometric-based enhancement of a remote user authentication scheme for e-healthcare system R Ali, AK Pal Arabian Journal for Science and Engineering 43 (12), 7837-7852, 2018 | 25 | 2018 |
A secure and robust three-factor based authentication scheme using RSA cryptosystem R Ali, AK Pal International Journal of Business Data Communications and Networking (IJBDCN …, 2017 | 15 | 2017 |
An enhanced authentication scheme for Internet of Things and cloud based on elliptic curve cryptography P Bhuarya, P Chandrakar, R Ali, A Sharaff International Journal of Communication Systems, e4834, 2021 | 14 | 2021 |
A secure authentication protocol for vehicular ad-hoc networks P Chandrakar, A Jain, S Balivada, R Ali 2019 IEEE international conference on electrical, computer and communication …, 2019 | 8 | 2019 |
On the security weaknesses in password-based anonymous authentication scheme for e-health care R Ali, P Chandrakar, A Kumar Design Frameworks for Wireless Networks, 23-40, 2020 | 6 | 2020 |
A secure blockchain-assisted authentication framework for electronic health records V Kumar, R Ali, PK Sharma International Journal of Information Technology, 1-13, 2024 | 4 | 2024 |
Evidence management system using blockchain and distributed file system (ipfs) S Jamulkar, P Chandrakar, R Ali, A Agrawal, K Tiwari Machine Learning and Big Data Analytics (Proceedings of International …, 2022 | 4 | 2022 |
A Two-factor based Remote User Authentication Scheme using ElGamal Cryptosystem P Soni, R Ali, AK Pal Proceedings of the ACM Workshop on Internet of Things (IoT) Security: Issues …, 2017 | 4 | 2017 |
Cryptanalysis and Improvement of a Secure Mutual Authentication Scheme for Remote Users P Chandrakar, AS Chauhan, R Ali 2019 IEEE International Conference on Electrical, Computer and Communication …, 2019 | 3 | 2019 |
A smart contract-based robotic surgery authentication system for healthcare using 6G-Tactile Internet N Kumar, R Ali Computer Networks 238, 110133, 2024 | 2 | 2024 |
A Secure ECG based Smart Authentication Scheme for IoT Devices P Chandrakar, A Kumar, R Ali, RD Patidar 2021 Emerging Trends in Industry 4.0 (ETI 4.0), 1-7, 2021 | 2 | 2021 |
A secure authentication mechanism for wireless sensor networks R Ali, P Chandrakar, MS Obaidat, KF Hsiao, AK Pal, SKH Islam 2020 International Conference on Computer, Information and Telecommunication …, 2020 | 2 | 2020 |
A secure three-factor remote user authentication scheme using elliptic curve cryptosystem R Ali, AK Pal Proceedings of the International Conference on Microelectronics, Computing …, 2018 | 2 | 2018 |
Blockchain-enabled authentication framework for Maritime Transportation System empowered by 6G-IoT N Kumar, R Ali Computer Networks 244, 110353, 2024 | 1 | 2024 |
Design of Robust Smartcard-Based User Anonymous Authentication Protocol with AVISPA Simulation R Ali, P Chandrakar Architectural Wireless Networks Solutions and Security Issues, 27, 2021 | 1 | 2021 |