default search action
Shehzad Ashraf Chaudhry
Person information
- affiliation: Istanbul Gelisim University, Turkey
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j120]Anwar Ghani, Saeed Ullah Jan, Shehzad Ashraf Chaudhry, Rashid Ahmad, DoHyeun Kim:
MCDH-SLKAP: Modified Computational Diffie-Hellman-Based Secure and Lightweight Key Agreement Protocol for Decentralized Edge Computing Networks. IEEE Access 12: 133923-133936 (2024) - [j119]Ali Raza, Shafiq Ur Rehman Khan, Raja Sher Afgun Usmani, Ashok Kumar Das, Shehzad Ashraf Chaudhry:
A Novel Temporal Footprints-Based Framework for Fake News Detection. IEEE Access 12: 172419-172428 (2024) - [j118]Mohd Shariq, Mauro Conti, Karan Singh, Chhagan Lal, Ashok Kumar Das, Shehzad Ashraf Chaudhry, Mehedi Masud:
Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing. Comput. Networks 252: 110678 (2024) - [j117]Chien-Ming Chen, Zhaoting Chen, Ashok Kumar Das, Shehzad Ashraf Chaudhry:
A Security-Enhanced and Ultralightweight Communication Protocol for Internet of Medical Things. IEEE Internet Things J. 11(6): 10168-10182 (2024) - [j116]Khalid Mahmood, Zahid Ghaffar, Muhammad Farooq, Khalid Yahya, Ashok Kumar Das, Shehzad Ashraf Chaudhry:
A Security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones. IEEE Internet Things J. 11(12): 22301-22309 (2024) - [j115]Marimuthu Karuppiah, Shehzad Ashraf Chaudhry, Mohammed H. Alsharif:
Scalable computing for large-scale multimedia data analytics. J. Intell. Inf. Syst. 62(3): 601-603 (2024) - [j114]Cheru Haile Tesfay, Zheng Xiang, Long Yang, Michael Abebe Berwo, Jabar Mahmood, Shehzad Ashraf Chaudhry:
An effective and efficient UAV leader selection scheme in swarm of UAVs. Phys. Commun. 67: 102513 (2024) - [j113]Azeem Irshad, Bander A. Alzahrani, Aiiad Albeshri, Khalid Alsubhi, Anand Nayyar, Shehzad Ashraf Chaudhry:
SPAKE-DC: A Secure PUF Enabled Authenticated Key Exchange for 5G-Based Drone Communications. IEEE Trans. Veh. Technol. 73(4): 5770-5780 (2024) - [j112]Muhammad Tanveer, Abdallah Aldosary, Salah-Ud-Din Khokhar, Ashok Kumar Das, Saud Alhajaj Aldossari, Shehzad Ashraf Chaudhry:
PAF-IoD: PUF-Enabled Authentication Framework for the Internet of Drones. IEEE Trans. Veh. Technol. 73(7): 9560-9574 (2024) - [j111]Chien-Ming Chen, Zhen Li, Ashok Kumar Das, Shehzad Ashraf Chaudhry, Pascal Lorenz:
Provably Secure Authentication Scheme for Fog Computing-Enabled Intelligent Social Internet of Vehicles. IEEE Trans. Veh. Technol. 73(9): 13600-13610 (2024) - 2023
- [j110]Sulaiman M. Karim, Adib Habbal, Shehzad Ashraf Chaudhry, Azeem Irshad:
BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment. IEEE Access 11: 36158-36175 (2023) - [j109]Arslan Shafique, Mujeeb Ur Rehman, Kashif Hesham Khan, Sajjad Shaukat Jamal, Abid Mehmood, Shehzad Ashraf Chaudhry:
Securing High-Resolution Images From Unmanned Aerial Vehicles With DNA Encoding and Bit-Plane Extraction Method. IEEE Access 11: 44559-44577 (2023) - [j108]Sajid Hussain, Muhammad Farooq, Bander A. Alzahrani, Aiiad Albeshri, Khalid Alsubhi, Shehzad Ashraf Chaudhry:
An Efficient and Reliable User Access Protocol for Internet of Drones. IEEE Access 11: 59688-59700 (2023) - [j107]Ki-Il Kim, Aswani Kumar Cherukuri, Xue Jun Li, Tanveer Ahmad, Muhammad Rafiq, Shehzad Ashraf Chaudhry:
Guest Editorial: Special issue on explainable AI empowered for indoor positioning and indoor navigation. CAAI Trans. Intell. Technol. 8(4): 1101-1103 (2023) - [j106]Anand Kumar, Karan Singh, Mohd Shariq, Chhagan Lal, Mauro Conti, Ruhul Amin, Shehzad Ashraf Chaudhry:
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems. Comput. Commun. 205: 147-157 (2023) - [j105]Muhammad Tanveer, Akhtar Badshah, Abd Ullah Khan, Hisham Alasmary, Shehzad Ashraf Chaudhry:
CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things. Internet Things 23: 100902 (2023) - [j104]Azeem Irshad, Ghulam Ali Mallah, Muhammad Bilal, Shehzad Ashraf Chaudhry, Muhammad Shafiq, Houbing Song:
SUSIC: A Secure User Access Control Mechanism for SDN-Enabled IIoT and Cyber-Physical Systems. IEEE Internet Things J. 10(18): 16504-16515 (2023) - [j103]Abid Mehmood, Arslan Shafique, Shehzad Ashraf Chaudhry, Moatsum Alawida, Abdul Nasir Khan, Neeraj Kumar:
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption. J. Inf. Secur. Appl. 78: 103590 (2023) - [j102]Naveed Khan, Jianbiao Zhang, Huhnkuk Lim, Jehad Ali, Intikhab Ullah, Muhammad Salman Pathan, Shehzad Ashraf Chaudhry:
An ECC-based mutual data access control protocol for next-generation public cloud. J. Cloud Comput. 12(1): 101 (2023) - [j101]Muhammad Tanveer, Ali Kashif Bashir, Bander A. Alzahrani, Aiiad Albeshri, Khalid Alsubhi, Shehzad Ashraf Chaudhry:
CADF-CSE: Chaotic map-based authenticated data access/sharing framework for IoT-enabled cloud storage environment. Phys. Commun. 59: 102087 (2023) - [j100]Shehzad Ashraf Chaudhry, Khalid Yahya, Sahil Garg, Georges Kaddoum, Mohammad Mehedi Hassan, Yousaf Bin Zikria:
LAS-SG: An Elliptic Curve-Based Lightweight Authentication Scheme for Smart Grid Environments. IEEE Trans. Ind. Informatics 19(2): 1504-1511 (2023) - [j99]Maryam Zia, Mohammad S. Obaidat, Khalid Mahmood, Salman Shamshad, Muhammad Asad Saleem, Shehzad Ashraf Chaudhry:
A Provably Secure Lightweight Key Agreement Protocol for Wireless Body Area Networks in Healthcare System. IEEE Trans. Ind. Informatics 19(2): 1683-1690 (2023) - [j98]Haibin Lv, Enrico Natalizio, Houbing Song, Shehzad Ashraf:
Guest Editorial Medical Image Analysis Embedded on Microprocessors. IEEE J. Biomed. Health Informatics 27(3): 1152-1153 (2023) - [j97]Akhtar Badshah, Muhammad Waqas, Fazal Muhammad, Ghulam Abbas, Ziaul Haq Abbas, Shehzad Ashraf Chaudhry, Sheng Chen:
AAKE-BIVT: Anonymous Authenticated Key Exchange Scheme for Blockchain-Enabled Internet of Vehicles in Smart Transportation. IEEE Trans. Intell. Transp. Syst. 24(2): 1739-1755 (2023) - [j96]Shehzad Ashraf Chaudhry, Azeem Irshad, Muhammad Asghar Khan, Sajjad Ahmad Khan, Summera Nosheen, Ahmad Ali AlZubi, Yousaf Bin Zikria:
A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System. IEEE Trans. Intell. Transp. Syst. 24(2): 2401-2410 (2023) - [c7]Muhammad Umar Farooq Qaisar, Weijie Yuan, Paolo Bellavista, Shehzad Ashraf Chaudhry, Adeel Ahmed, Muhammad Ali Imran:
Reliable and Resilient Communication in Duty Cycled Software Defined Wireless Sensor Networks. ICC Workshops 2023: 397-402 - [i2]Ephrem Afele Retta, Richard F. E. Sutcliffe, Jabar Mahmood, Michael Abebe Berwo, Eiad Almekhlafi, Sajjad Ahmed Khan, Shehzad Ashraf Chaudhry, Mustafa Mhamed, Jun Feng:
Cross-Corpus Multilingual Speech Emotion Recognition: Amharic vs. Other Languages. CoRR abs/2307.10814 (2023) - 2022
- [j95]Muhammad Tanveer, Abd Ullah Khan, Ahmed Alkhayyat, Shehzad Ashraf Chaudhry, Yousaf Bin Zikria, Sung Won Kim:
REAS-TMIS: Resource-Efficient Authentication Scheme for Telecare Medical Information System. IEEE Access 10: 23008-23021 (2022) - [j94]Ijaz Darman, Musaria Karim Mahmood, Shehzad Ashraf Chaudhry, Sajjad Ahmad Khan, Huhnkuk Lim:
Designing an Enhanced User Authenticated Key Management Scheme for 6G-Based Industrial Applications. IEEE Access 10: 92774-92787 (2022) - [j93]Azeem Irshad, Shehzad Ashraf Chaudhry, Anwar Ghani, Ghulam Ali Mallah, Muhammad Bilal, Bander A. Alzahrani:
A low-cost privacy preserving user access in mobile edge computing framework. Comput. Electr. Eng. 98: 107692 (2022) - [j92]Marimuthu Karuppiah, Shehzad Ashraf Chaudhry, Mohammed H. Alsharif:
Guest Editorial: Introduction to the special section on security and privacy in the big data era (VSI-spbd). Comput. Electr. Eng. 99: 107786 (2022) - [j91]Waseem Akram, Khalid Mahmood, Xiong Li, Mazhar Sadiq, Zhihan Lv, Shehzad Ashraf Chaudhry:
An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing. Comput. Networks 217: 109335 (2022) - [j90]Khalid Mahmood, Muhammad Faizan Ayub, Syed Zohaib Hassan, Zahid Ghaffar, Zhihan Lv, Shehzad Ashraf Chaudhry:
A seamless anonymous authentication protocol for mobile edge computing infrastructure. Comput. Commun. 186: 12-21 (2022) - [j89]Sajid Hussain, Khalid Mahmood, Muhammad Khurram Khan, Chien-Ming Chen, Bander A. Alzahrani, Shehzad Ashraf Chaudhry:
Designing secure and lightweight user access to drone for smart city surveillance. Comput. Stand. Interfaces 80: 103566 (2022) - [j88]Salman Shamshad, Muhammad Faizan Ayub, Khalid Mahmood, Saru Kumari, Shehzad Ashraf Chaudhry, Chien-Ming Chen:
An enhanced scheme for mutual authentication for healthcare services. Digit. Commun. Networks 8(2): 150-161 (2022) - [j87]Zhen Li, Qingkai Miao, Shehzad Ashraf Chaudhry, Chien-Ming Chen:
A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles. Int. J. Distributed Sens. Networks 18(6): 155013292211043 (2022) - [j86]Muhammad Tanveer, Abd Ullah Khan, Neeraj Kumar, Alamgir Naushad, Shehzad Ashraf Chaudhry:
A Robust Access Control Protocol for the Smart Grid Systems. IEEE Internet Things J. 9(9): 6855-6865 (2022) - [j85]Bander A. Alzahrani, Shehzad Ashraf Chaudhry, Ahmed Barnawi, Wenjing Xiao, Min Chen, Abdullah Al-Barakati:
ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment. J. Ambient Intell. Humaniz. Comput. 13(11): 5123-5135 (2022) - [j84]Chien-Ming Chen, Shehzad Ashraf Chaudhry, Kuo-Hui Yeh, Muhammad Naveed Aman:
Security, Trust and Privacy for Cloud, Fog and Internet of Things. Secur. Commun. Networks 2022: 9841709:1-9841709:2 (2022) - [j83]Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Neeraj Kumar, Mohammed H. Alsharif:
PFLUA-DIoT: A Pairing Free Lightweight and Unlinkable User Access Control Scheme for Distributed IoT Environments. IEEE Syst. J. 16(1): 309-316 (2022) - [j82]Shehzad Ashraf Chaudhry, Jamel Nebhen, Khalid Yahya, Fadi M. Al-Turjman:
A Privacy Enhanced Authentication Scheme for Securing Smart Grid Infrastructure. IEEE Trans. Ind. Informatics 18(7): 5000-5006 (2022) - [j81]Farva Rafique, Mohammad S. Obaidat, Khalid Mahmood, Muhammad Faizan Ayub, Javed Ferzund, Shehzad Ashraf Chaudhry:
An Efficient and Provably Secure Certificateless Protocol for Industrial Internet of Things. IEEE Trans. Ind. Informatics 18(11): 8039-8046 (2022) - [j80]Muhammad Wahid Akram, Ali Kashif Bashir, Salman Shamshad, Muhammad Asad Saleem, Ahmad Ali AlZubi, Shehzad Ashraf Chaudhry, Bander A. Alzahrani, Yousaf Bin Zikria:
A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance. IEEE Trans. Intell. Transp. Syst. 23(10): 19634-19643 (2022) - 2021
- [j79]Muhammad Tanveer, Abd Ullah Khan, Habib Shah, Ahmed Alkhayyat, Shehzad Ashraf Chaudhry, Musheer Ahmad:
ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids. IEEE Access 9: 143366-143377 (2021) - [j78]Muhammad Tanveer, Abd Ullah Khan, Habib Shah, Shehzad Ashraf Chaudhry, Alamgir Naushad:
PASKE-IoD: Privacy-Protecting Authenticated Key Establishment for Internet of Drones. IEEE Access 9: 145683-145698 (2021) - [j77]Zeeshan Ali, Shehzad Ashraf Chaudhry, Khalid Mahmood, Sahil Garg, Zhihan Lv, Yousaf Bin Zikria:
A clogging resistant secure authentication scheme for fog computing services. Comput. Networks 185: 107731 (2021) - [j76]Shehzad Ashraf Chaudhry, Khalid Yahya, Marimuthu Karuppiah, Rupak Kharel, Ali Kashif Bashir, Yousaf Bin Zikria:
GCACS-IoD: A certificate based generic access control scheme for Internet of drones. Comput. Networks 191: 107999 (2021) - [j75]Azeem Irshad, Shehzad Ashraf Chaudhry, Anwar Ghani, Muhammad Bilal:
A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment. Comput. Networks 195: 108219 (2021) - [j74]Minahil Rana, Akasha Shafiq, Izwa Altaf, Mamoun Alazab, Khalid Mahmood, Shehzad Ashraf Chaudhry, Yousaf Bin Zikria:
A secure and lightweight authentication scheme for next generation IoT infrastructure. Comput. Commun. 165: 85-96 (2021) - [j73]Shehzad Ashraf Chaudhry, Jamel Nebhen, Azeem Irshad, Ali Kashif Bashir, Rupak Kharel, Keping Yu, Yousaf Bin Zikria:
A Physical Capture Resistant Authentication Scheme for the Internet of Drones. IEEE Commun. Stand. Mag. 5(4): 62-67 (2021) - [j72]Azeem Irshad, Shehzad Ashraf Chaudhry:
Comment on 'ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications'. IET Networks 10(5): 244-245 (2021) - [j71]Hafeez Ur Rehman, Anwar Ghani, Shehzad Ashraf Chaudhry, Mohammed H. Alsharif, Narjes Nabipour:
A secure and improved multi server authentication protocol using fuzzy commitment. Multim. Tools Appl. 80(11): 16907-16931 (2021) - [j70]Shehzad Ashraf Chaudhry:
Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles. Secur. Commun. Networks 2021: 5554318:1-5554318:9 (2021) - [j69]Mahammad Shareef Mekala, Rizwan Patan, SK Hafizul Islam, Debabrata Samanta, Ghulam Ali Mallah, Shehzad Ashraf Chaudhry:
DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre. Secur. Commun. Networks 2021: 6688162:1-6688162:16 (2021) - [j68]Azeem Irshad, Shehzad Ashraf Chaudhry, Osama Ahmad Alomari, Khalid Yahya, Neeraj Kumar:
A Novel Pairing-Free Lightweight Authentication Protocol for Mobile Cloud Computing Framework. IEEE Syst. J. 15(3): 3664-3672 (2021) - [j67]Sajid Hussain, Shehzad Ashraf Chaudhry, Osama Ahmad Alomari, Mohammed H. Alsharif, Muhammad Khurram Khan, Neeraj Kumar:
Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones. IEEE Syst. J. 15(3): 4431-4438 (2021) - [j66]Shehzad Ashraf Chaudhry, Azeem Irshad, Khalid Yahya, Neeraj Kumar, Mamoun Alazab, Yousaf Bin Zikria:
Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment. ACM Trans. Internet Techn. 21(3): 78:1-78:19 (2021) - [j65]Azeem Irshad, Muhammad Usman, Shehzad Ashraf Chaudhry, Ali Kashif Bashir, Alireza Jolfaei, Gautam Srivastava:
Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server. IEEE Trans. Reliab. 70(3): 1014-1025 (2021) - [c6]Muhammad Ayaz Khan, Anwar Ghani, Mohammad S. Obaidat, Pandi Vijayakumar, Khwaja Mansoor, Shehzad Ashraf Chaudhry:
A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System. CCCI 2021: 1-5 - 2020
- [j64]Zeeshan Ali, Shehzad Ashraf Chaudhry, Muhammad Sher Ramzan, Fadi Al-Turjman:
Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles. IEEE Access 8: 43711-43724 (2020) - [j63]Shehzad Ashraf Chaudhry, Hosam Alhakami, Abdullah Baz, Fadi Al-Turjman:
Securing Demand Response Management: A Certificate-Based Access Control in Smart Grid Edge Computing Infrastructure. IEEE Access 8: 101235-101243 (2020) - [j62]Zeeshan Ali, Sajid Hussain, Haseeb Ur Rehman, Asmaa Munshi, Misbah Liaqat, Neeraj Kumar, Shehzad Ashraf Chaudhry:
ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments. IEEE Access 8: 107993-108003 (2020) - [j61]Shehzad Ashraf Chaudhry, Khalid Yahya, Fadi Al-Turjman, Ming-Hour Yang:
A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems. IEEE Access 8: 139244-139254 (2020) - [j60]Shehzad Ashraf Chaudhry, Taeshik Shon, Fadi Al-Turjman, Mohammed H. Alsharif:
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems. Comput. Commun. 153: 527-537 (2020) - [j59]Muhammad Naeem, Shehzad Ashraf Chaudhry, Khalid Mahmood, Marimuthu Karuppiah, Saru Kumari:
A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things. Int. J. Commun. Syst. 33(13) (2020) - [j58]Zeeshan Ali, Anwar Ghani, Imran Khan, Shehzad Ashraf Chaudhry, SK Hafizul Islam, Debasis Giri:
A robust authentication and access control protocol for securing wireless healthcare sensor networks. J. Inf. Secur. Appl. 52: 102502 (2020) - [j57]Mohammed H. Alsharif, Anabi Hilary Kelechi, Khalid Yahya, Shehzad Ashraf Chaudhry:
Machine Learning Algorithms for Smart Data Analysis in Internet of Things Environment: Taxonomies and Research Trends. Symmetry 12(1): 88 (2020) - [j56]Bander A. Alzahrani, Shehzad Ashraf Chaudhry, Ahmed Barnawi, Abdullah Al-Barakati, Mohammed H. Alsharif:
A Privacy Preserving Authentication Scheme for Roaming in IoT-Based Wireless Mobile Networks. Symmetry 12(2): 287 (2020) - [j55]Mohammed H. Alsharif, Anabi Hilary Kelechi, Mahmoud A. M. Albreem, Shehzad Ashraf Chaudhry, M. Sultan Zia, Sunghwan Kim:
Sixth Generation (6G) Wireless Networks: Vision, Research Activities, Challenges and Potential Solutions. Symmetry 12(4): 676 (2020) - [j54]Mahmood Ul Hassan, Shehzad Ashraf Chaudhry, Azeem Irshad:
An Improved SIP Authenticated Key Agreement Based on Dongqing et al. Wirel. Pers. Commun. 110(4): 2087-2107 (2020) - [i1]Hafeez Ur Rehman, Anwar Ghani, Shehzad Ashraf Chaudhry, Mohammed H. Alsharif, Narjes Nabipour:
A Secure and Improved Multi Server Authentication Protocol Using Fuzzy Commitment. CoRR abs/2004.07618 (2020)
2010 – 2019
- 2019
- [j53]Shehzad Ashraf Chaudhry, I Luk Kim, Seungmin Rho, Mohammad Sabzinejad Farash, Taeshik Shon:
An improved anonymous authentication scheme for distributed mobile cloud computing services. Clust. Comput. 22(Suppl 1): 1595-1609 (2019) - [j52]Ali Mohammad Khodadoust, Javad Khodadoust, Azeem Irshad, Shehzad Ashraf Chaudhry:
Performance analysis of secure communications over correlated slow-fading additive white Gaussian noise channels. Int. J. Commun. Syst. 32(12) (2019) - [j51]Azeem Irshad, Shehzad Ashraf Chaudhry, Muhammad Shafiq, Muhammad Usman, Muhammad Asif, Anwar Ghani:
A provable and secure mobile user authentication scheme for mobile cloud computing services. Int. J. Commun. Syst. 32(14) (2019) - [j50]Anwar Ghani, Khwaja Mansoor, Shahid Mehmood, Shehzad Ashraf Chaudhry, Arif Ur Rahman, Malik Najmus Saqib:
Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key. Int. J. Commun. Syst. 32(16) (2019) - [j49]Khalid Mahmood, Jehangir Arshad, Shehzad Ashraf Chaudhry, Saru Kumari:
An enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure. Int. J. Commun. Syst. 32(16) (2019) - [j48]Sajid Hussain, Shehzad Ashraf Chaudhry:
Comments on "Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment". IEEE Internet Things J. 6(6): 10936-10940 (2019) - [j47]Azeem Irshad, Shehzad Ashraf Chaudhry, Muhammad Shafiq, Muhammad Usman, Muhammad Asif, Saru Kumari:
An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol. Inf. Technol. Control. 48(2): 211-224 (2019) - [j46]Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Saru Kumari, Fan Wu, Shehzad Ashraf Chaudhry, Niranchana Radhakrishnan:
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment. Mob. Networks Appl. 24(3): 1046-1062 (2019) - [j45]Khwaja Mansoor, Anwar Ghani, Shehzad Ashraf Chaudhry, Shahaboddin Shamshirband, Shahbaz Ghayyur, Amir Mosavi:
Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography. Sensors 19(21): 4752 (2019) - [j44]Azeem Irshad, Shehzad Ashraf Chaudhry, Muhammad Sher, Bander A. Alzahrani, Saru Kumari, Xiong Li, Fan Wu:
An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre. IEEE Syst. J. 13(1): 436-446 (2019) - 2018
- [j43]Khalid Mahmood, Shehzad Ashraf Chaudhry, Husnain Naqvi, Saru Kumari, Xiong Li, Arun Kumar Sangaiah:
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Gener. Comput. Syst. 81: 557-565 (2018) - [j42]Khalid Mahmood, Xiong Li, Shehzad Ashraf Chaudhry, Husnain Naqvi, Saru Kumari, Arun Kumar Sangaiah, Joel J. P. C. Rodrigues:
Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure. Future Gener. Comput. Syst. 88: 491-500 (2018) - [j41]Khalid Mahmood, Husnain Naqvi, Bander A. Alzahrani, Zahid Mehmood, Azeem Irshad, Shehzad Ashraf Chaudhry:
An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment. Int. J. Commun. Syst. 31(18) (2018) - [j40]Azeem Irshad, Husnain Naqvi, Shehzad Ashraf Chaudhry, Muhammad Usman, Muhammad Shafiq, Omid Mir, Ambrina Kanwal:
Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee's Scheme. Inf. Technol. Control. 47(3): 431-446 (2018) - [j39]Azeem Irshad, Muhammad Sher, Bander A. Alzahrani, Aiiad Albeshri, Shehzad Ashraf Chaudhry, Saru Kumari:
Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al. KSII Trans. Internet Inf. Syst. 12(1): 523-549 (2018) - [j38]Azeem Irshad, Muhammad Sher, Shehzad Ashraf Chaudhry, Qi Xie, Saru Kumari, Fan Wu:
An improved and secure chaotic map based authenticated key agreement in multi-server architecture. Multim. Tools Appl. 77(1): 1167-1204 (2018) - [j37]Shehzad Ashraf Chaudhry, Husnain Naqvi, Muhammad Khurram Khan:
An enhanced lightweight anonymous biometric based authentication scheme for TMIS. Multim. Tools Appl. 77(5): 5503-5524 (2018) - [j36]Azeem Irshad, Muhammad Sher, Shehzad Ashraf Chaudhry, Saru Kumari, Arun Kumar Sangaiah, Xiong Li, Fan Wu:
A secure mutual authenticated key agreement of user with multiple servers for critical systems. Multim. Tools Appl. 77(9): 11067-11099 (2018) - [j35]Shehzad Ashraf Chaudhry, Husnain Naqvi, Mohammad Sabzinejad Farash, Taeshik Shon, Muhammad Sher:
An improved and robust biometrics-based three factor authentication scheme for multiserver environments. J. Supercomput. 74(8): 3504-3520 (2018) - [j34]Imran Khan, Shehzad Ashraf Chaudhry, Muhammad Sher, Muhammad Khurram Khan:
An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data. J. Supercomput. 74(8): 3685-3703 (2018) - [j33]Azeem Irshad, Husnain Naqvi, Shehzad Ashraf Chaudhry, Shouket Raheem, Saru Kumari, Ambrina Kanwal, Muhammad Usman:
An efficient and secure design of multi-server authenticated key agreement protocol. J. Supercomput. 74(9): 4771-4797 (2018) - 2017
- [j32]Qi Jiang, Jianfeng Ma, Chao Yang, XinDi Ma, Jian Shen, Shehzad Ashraf Chaudhry:
Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput. Electr. Eng. 63: 182-195 (2017) - [j31]Shehzad Ashraf Chaudhry, Aiiad Albeshri, Naixue Xiong, Changhoon Lee, Taeshik Shon:
A privacy preserving authentication scheme for roaming in ubiquitous networks. Clust. Comput. 20(2): 1223-1236 (2017) - [j30]Mohammad Sabzinejad Farash, Shehzad Ashraf Chaudhry, Mohammad Heydari, Seyed Mohammad Sajad Sadough, Saru Kumari, Muhammad Khurram Khan:
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst. 30(4) (2017) - [j29]Tanmoy Maitra, Mohammad S. Obaidat, Ruhul Amin, SK Hafizul Islam, Shehzad Ashraf Chaudhry, Debasis Giri:
A robust ElGamal-based password-authentication protocol using smart card for client-server communication. Int. J. Commun. Syst. 30(11) (2017) - [j28]Azeem Irshad, Shehzad Ashraf Chaudhry, Saru Kumari, Muhammad Usman, Khalid Mahmood, Ch. Muhammad Shahzad Faisal:
An improved lightweight multiserver authentication scheme. Int. J. Commun. Syst. 30(17) (2017) - [j27]Mohammad Sabzinejad Farash, Shehzad Ashraf Chaudhry, SK Hafizul Islam, Muazzam Ali Khan Khattak, Aiiad Albeshri:
Security Vulnerabilities and Improvements of SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks. Inf. Technol. Control. 46(2): 205-218 (2017) - [j26]Mohammad Heydari, Seyed Mohammad Sajad Sadough, Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Khalid Mahmood:
An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems. Multim. Tools Appl. 76(12): 14225-14245 (2017) - [j25]Azeem Irshad, Muhammad Sher, Omer Nawaz, Shehzad Ashraf Chaudhry, Imran Khan, Saru Kumari:
A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme. Multim. Tools Appl. 76(15): 16463-16489 (2017) - [j24]Shehzad Ashraf Chaudhry, Husnain Naqvi, Muhammad Sher, Mohammad Sabzinejad Farash, Mahmood Ul Hassan:
An improved and provably secure privacy preserving authentication protocol for SIP. Peer-to-Peer Netw. Appl. 10(1): 1-15 (2017) - [j23]Saru Kumari, Shehzad Ashraf Chaudhry, Fan Wu, Xiong Li, Mohammad Sabzinejad Farash, Muhammad Khurram Khan:
An improved smart card based authentication scheme for session initiation protocol. Peer-to-Peer Netw. Appl. 10(1): 92-105 (2017) - [j22]Azeem Irshad, Shehzad Ashraf Chaudhry:
Comments on "A privacy preserving three-factor authentication protocol for e-health clouds". J. Supercomput. 73(4): 1504-1508 (2017) - [j21]Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Husnain Naqvi, SK Hafizul Islam, Taeshik Shon:
A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks. Wirel. Pers. Commun. 93(2): 311-335 (2017) - [j20]Shehzad Ashraf Chaudhry, Husnain Naqvi, Khalid Mahmood, Hafiz Farooq Ahmad, Muhammad Khurram Khan:
An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography. Wirel. Pers. Commun. 96(4): 5355-5373 (2017) - [j19]Azeem Irshad, Saru Kumari, Xiong Li, Fan Wu, Shehzad Ashraf Chaudhry, Hamed Arshad:
An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification. Wirel. Pers. Commun. 97(2): 2145-2166 (2017) - [c5]Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Sabariah Baharun, Hiroaki Anada, Mazdak Zamani, Akram M. Zeki, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan:
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management". ICIN 2017: 112-116 - 2016
- [j18]Khalid Mahmood, Shehzad Ashraf Chaudhry, Husnain Naqvi, Taeshik Shon, Hafiz Farooq Ahmad:
A lightweight message authentication scheme for Smart Grid communications in power sector. Comput. Electr. Eng. 52: 114-124 (2016) - [j17]Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Husnain Naqvi, Muhammad Sher:
A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electron. Commer. Res. 16(1): 113-139 (2016) - [j16]Azeem Irshad, Muhammad Sher, Hafiz Farooq Ahmad, Bander A. Alzahrani, Shehzad Ashraf Chaudhry, Rahul Kumar:
An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services. KSII Trans. Internet Inf. Syst. 10(12): 5529-5552 (2016) - [j15]Azeem Irshad, Hafiz Farooq Ahmad, Bander A. Alzahrani, Muhammad Sher, Shehzad Ashraf Chaudhry:
An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture. KSII Trans. Internet Inf. Syst. 10(12): 5572-5595 (2016) - [j14]Mohammad Sabzinejad Farash, Omer Nawaz, Khalid Mahmood, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan:
A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments. J. Medical Syst. 40(7): 165:1-165:7 (2016) - [j13]Shehzad Ashraf Chaudhry, Muhammad Tawab Khan, Muhammad Khurram Khan, Taeshik Shon:
A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography. J. Medical Syst. 40(11): 230:1-230:13 (2016) - [j12]Shehzad Ashraf Chaudhry:
A secure biometric based multi-server authentication scheme for social multimedia networks. Multim. Tools Appl. 75(20): 12705-12725 (2016) - [j11]Shehzad Ashraf Chaudhry, Imran Khan, Azeem Irshad, Muhammad Usman Ashraf, Muhammad Khurram Khan, Hafiz Farooq Ahmad:
A provably secure anonymous authentication scheme for Session Initiation Protocol. Secur. Commun. Networks 9(18): 5016-5027 (2016) - [j10]Azeem Irshad, Muhammad Sher, Shehzad Ashraf Chaudhry, Husnain Naqvi, Mohammad Sabzinejad Farash:
An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre. J. Supercomput. 72(4): 1623-1644 (2016) - [j9]Mohammad Heydari, Seyed Mohammad Sajad Sadough, Mohammad Sabzinejad Farash, Shehzad Ashraf Chaudhry, Khalid Mahmood:
An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client-Client Networks. Wirel. Pers. Commun. 88(2): 337-356 (2016) - 2015
- [j8]Shehzad Ashraf Chaudhry:
Comment on 'Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications'. IET Commun. 9(7): 1034 (2015) - [j7]Mohammad Heydari, Seyed Mohammad Sajad Sadough, Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Mohammad Reza Aref:
An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks. Inf. Technol. Control. 44(4): 387-403 (2015) - [j6]Shehzad Ashraf Chaudhry, Husnain Naqvi, Taeshik Shon, Muhammad Sher, Mohammad Sabzinejad Farash:
Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems. J. Medical Syst. 39(6): 66:1-66:11 (2015) - [j5]Shehzad Ashraf Chaudhry, Khalid Mahmood, Husnain Naqvi, Muhammad Khurram Khan:
An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography. J. Medical Syst. 39(11): 175 (2015) - [j4]Shehzad Ashraf Chaudhry, Nizamuddin, Muhammad Sher, Anwar Ghani, Husnain Naqvi, Azeem Irshad:
An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multim. Tools Appl. 74(5): 1711-1723 (2015) - [j3]Azeem Irshad, Muhammad Sher, Eid Rehman, Shehzad Ashraf Chaudhry, Mahmood Ul Hassan, Anwar Ghani:
A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card. Multim. Tools Appl. 74(11): 3967-3984 (2015) - [j2]Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Husnain Naqvi, Saru Kumari, Muhammad Khurram Khan:
An enhanced privacy preserving remote user authentication scheme with provable security. Secur. Commun. Networks 8(18): 3782-3795 (2015) - [c4]Shehzad Ashraf Chaudhry, Khalid Mahmood, Husnain Naqvi, Muhammad Sher:
A Secure Authentication Scheme for Session Initiation Protocol Based on Elliptic Curve Cryptography. CIT/IUCC/DASC/PICom 2015: 1960-1965 - 2014
- [j1]Azeem Irshad, Muhammad Sher, Ch. Muhammad Shahzad Faisal, Anwer Ghani, Mahmood Ul Hassan, Shehzad Ashraf Chaudhry:
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Secur. Commun. Networks 7(8): 1210-1218 (2014) - 2012
- [c3]Shehzad Ashraf Chaudhry, Nizamuddin, Muhammad Sher:
Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem. ICISTM 2012: 135-142 - [c2]Noor Ul Amin, Muhammad Asad, Nizamuddin, Shehzad Ashraf Chaudhry:
An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem. ICNSC 2012: 118-121 - 2010
- [c1]Rehan Shafi, Aneel Rahim, Fahad Bin Muhaya, Shehzad Ashraf, Muhammad Sher:
Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks. ISA 2010: 233-240
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-30 00:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint