Shehzad Ashraf Chaudhry
Cited by
Cited by
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
K Mahmood, SA Chaudhry, H Naqvi, S Kumari, X Li, AK Sangaiah
Future Generation Computer Systems 81, 557-565, 2018
Sixth generation (6G) wireless networks: Vision, research activities, challenges and potential solutions
MH Alsharif, AH Kelechi, MA Albreem, SA Chaudhry, MS Zia, S Kim
Symmetry 12 (4), 676, 2020
A lightweight message authentication scheme for smart grid communications in power sector
K Mahmood, SA Chaudhry, H Naqvi, T Shon, HF Ahmad
Computers & Electrical Engineering 52, 114-124, 2016
Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
SA Chaudhry, H Naqvi, T Shon, M Sher, MS Farash
Journal of medical systems 39 (6), 66, 2015
Efficient end-to-end authentication protocol for wearable health monitoring systems
Q Jiang, J Ma, C Yang, X Ma, J Shen, SA Chaudhry
Computers & Electrical Engineering 63, 182-195, 2017
An improved and provably secure privacy preserving authentication protocol for SIP
SA Chaudhry, H Naqvi, M Sher, MS Farash, MU Hassan
Peer-to-Peer Networking and Applications 10 (1), 1-15, 2017
A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
SA Chaudhry, MS Farash, H Naqvi, M Sher
Electronic Commerce Research 16, 113-139, 2016
Securing smart city surveillance: A lightweight authentication mechanism for unmanned vehicles
Z Ali, SA Chaudhry, MS Ramzan, F Al-Turjman
IEEE Access 8, 43711-43724, 2020
An enhanced privacy preserving remote user authentication scheme with provable security
SA Chaudhry, MS Farash, H Naqvi, S Kumari, MK Khan
Security and Communication Networks 8 (18), 3782-3795, 2015
An improved smart card based authentication scheme for session initiation protocol
S Kumari, SA Chaudhry, F Wu, X Li, MS Farash, MK Khan
Peer-to-Peer Networking and Applications 10, 92-105, 2017
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
MS Farash, SA Chaudhry, M Heydari, S Sadough, S Mohammad, ...
International Journal of Communication Systems 30 (4), e3019, 2017
Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure
K Mahmood, X Li, SA Chaudhry, H Naqvi, S Kumari, AK Sangaiah, ...
Future Generation Computer Systems 88, 491-500, 2018
Securing IoT-based RFID systems: A robust authentication protocol using symmetric cryptography
K Mansoor, A Ghani, SA Chaudhry, S Shamshirband, SAK Ghayyur, ...
Sensors 19 (21), 4752, 2019
Machine learning algorithms for smart data analysis in internet of things environment: taxonomies and research trends
MH Alsharif, AH Kelechi, K Yahya, SA Chaudhry
Symmetry 12 (1), 88, 2020
An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography
SA Chaudhry, K Mahmood, H Naqvi, MK Khan
Journal of Medical Systems 39, 1-12, 2015
A single round-trip sip authentication scheme for voice over internet protocol using smart card
A Irshad, M Sher, E Rehman, SA Ch, MU Hassan, A Ghani
Multimedia Tools and Applications 74, 3967-3984, 2015
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems
SA Chaudhry, T Shon, F Al-Turjman, MH Alsharif
Computer Communications 153, 527-537, 2020
A robust authentication and access control protocol for securing wireless healthcare sensor networks
Z Ali, A Ghani, I Khan, SA Chaudhry, SKH Islam, D Giri
Journal of Information Security and Applications 52, 102502, 2020
A provably secure and efficient authenticated key agreement scheme for energy internet-based vehicle-to-grid technology framework
A Irshad, M Usman, SA Chaudhry, H Naqvi, M Shafiq
IEEE Transactions on Industry Applications 56 (4), 4425-4435, 2020
Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key
A Ghani, K Mansoor, S Mehmood, SA Chaudhry, AU Rahman, ...
International Journal of Communication Systems 32 (16), e4139, 2019
The system can't perform the operation now. Try again later.
Articles 1–20