default search action
Ruhul Amin 0001
Person information
- affiliation: IIIT Naya Raipur, Chhattisgarh, India
Other persons with the same name
- Ruhul Amin — disambiguation page
- Ruhul Amin 0002 — Assam University, Silchar, India
- Ruhul Amin 0003 — Jashore University of Science and Technology, Jessore, Bangladesh
- Ruhul Amin 0004 — Pabna University of Science and Technology, Pabna, Bangladesh
- Ruhul Amin 0005 — United International University, Dhaka, Bangladesh
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j95]Mohammad Abdussami, Sanjeev Kumar Dwivedi, Taher Al-Shehari, P. Saravanan, Mohammed Kadrie, Taha Alfakih, Hussain Alsalman, Ruhul Amin:
DEAC-IoT: Design of lightweight authenticated key agreement protocol for Intra and Inter-IoT device communication using ECC with FPGA implementation. Comput. Electr. Eng. 120: 109696 (2024) - [j94]Raju Gudla, Satyanarayana Vollala, Srinivasa K. G., Ruhul Amin:
A novel approach for classification of Tor and non-Tor traffic using efficient feature selection methods. Expert Syst. Appl. 249: 123544 (2024) - [j93]Vatsal Vasani, Kumar Prateek, Ruhul Amin, Soumyadev Maity, Ashutosh Dhar Dwivedi:
Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions. J. Ind. Inf. Integr. 39: 100594 (2024) - [j92]Isha Pali, Ruhul Amin, Mohammad Abdussami:
Autonomous vehicle security: Current survey and future research challenges. Secur. Priv. 7(3) (2024) - [j91]Sanjeev Kumar Dwivedi, Mohammad Abdussami, Ruhul Amin, Muhammad Khurram Khan:
D³APTS: Design of ECC-Based Authentication Protocol and Data Storage for Tactile Internet Enabled IoD System With Blockchain. IEEE Trans. Consumer Electron. 70(1): 4239-4248 (2024) - [j90]Sanjeev Kumar Dwivedi, Ruhul Amin, Satyanarayana Vollala, Ashok Kumar Das:
Design of Blockchain and ECC-Based Robust and Efficient Batch Authentication Protocol for Vehicular Ad-Hoc Networks. IEEE Trans. Intell. Transp. Syst. 25(1): 275-288 (2024) - [j89]Kumar Prateek, Meghashrita Das, Sairaaj Surve, Soumyadev Maity, Ruhul Amin:
Q-Secure-P²-SMA: Quantum-Secure Privacy- Preserving Smart Meter Authentication for Unbreakable Security in Smart Grid. IEEE Trans. Netw. Serv. Manag. 21(5): 5149-5163 (2024) - [j88]Isha Pali, Mohammad Abdussami, Ruhul Amin, Taher Al-Shehari, Muna Al-Razgan, Taha Alfakih:
S2DN: Design of robust authentication protocol with session key establishment in multi-controller based software-defined VANETs. Veh. Commun. 47: 100767 (2024) - [c17]Sanjeev Kumar Dwivedi, Mohammad S. Obaidat, Mansi Mittal, Nilesh Ranjan, Honey Tyagi, Ruhul Amin, Kuei-Fang Hsiao:
A Study on "Blockchain-Enabled Digital Twins: The Next Wave of Industrial Transformation with Future Research Challenges". CITS 2024: 1-6 - 2023
- [j87]Mohammad Abdussami, Ruhul Amin, Satyanarayana Vollala:
Provably secured lightweight authenticated key agreement protocol for modern health industry. Ad Hoc Networks 141: 103094 (2023) - [j86]Sanjeev Kumar Dwivedi, Ruhul Amin, Satyanarayana Vollala:
Design of secured blockchain based decentralized authentication protocol for sensor networks with auditing and accountability. Comput. Commun. 197: 124-140 (2023) - [j85]Anand Kumar, Karan Singh, Mohd Shariq, Chhagan Lal, Mauro Conti, Ruhul Amin, Shehzad Ashraf Chaudhry:
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems. Comput. Commun. 205: 147-157 (2023) - [j84]Mohammad Abdussami, Ruhul Amin, P. Saravanan, Satyanarayana Vollala:
BSAPM: BlockChain based secured authentication protocol for large scale WSN with FPGA implementation. Comput. Commun. 209: 63-77 (2023) - [j83]C. Madan Kumar, Ruhul Amin, M. Brindha:
Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System. Cyber Secur. Appl. 1: 100013 (2023) - [j82]Ruhul Amin, Sakshita Jayaswal, Venkatasamy Sureshkumar, Balram Rathore, Ananya Jha, Mohammad Abdussami:
IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication. J. Ambient Intell. Humaniz. Comput. 14(7): 9529-9542 (2023) - [j81]Sanjeev Kumar Dwivedi, Ruhul Amin, Satyanarayana Vollala:
Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment. Peer Peer Netw. Appl. 16(1): 1-21 (2023) - [j80]Palak Chandrakar, Rashi Bagga, Yogesh Kumar, Sanjeev Kumar Dwivedi, Ruhul Amin:
Blockchain based security protocol for device to device secure communication in internet of things networks. Secur. Priv. 6(1) (2023) - [j79]C. Madan Kumar, Ruhul Amin, M. Brindha:
Cryptanalysis and improvement of REAS-TMIS: Resource-efficient authentication scheme for telecare medical information system. Secur. Priv. 6(1) (2023) - [j78]Aryaman, Nenavath Srinivas Naik, Satyanarayana Vollala, Ruhul Amin:
Detecting and predicting countermeasures against clickjacking. Secur. Priv. 6(5) (2023) - [j77]Kumar Prateek, Soumyadev Maity, Ruhul Amin:
An Unconditionally Secured Privacy-Preserving Authentication Scheme for Smart Metering Infrastructure in Smart Grid. IEEE Trans. Netw. Sci. Eng. 10(2): 1085-1095 (2023) - [j76]Sanjeev Kumar Dwivedi, Ruhul Amin, Satyanarayana Vollala, Muhammad Khurram Khan:
B-HAS: Blockchain-Assisted Efficient Handover Authentication and Secure Communication Protocol in VANETs. IEEE Trans. Netw. Sci. Eng. 10(6): 3491-3504 (2023) - [c16]Mohammad Abdussami, Sanjeev Kumar Dwivedi, Mohammad S. Obaidat, Ruhul Amin, Satyanarayana Vollala, Balqies Sadoun:
Cryptanalysis and Improvement of a Blockchain Based Lightweight Authentication and Key Agreement Scheme for Internet of Vehicles. CCCI 2023: 1-6 - 2022
- [j75]Sanjeev Kumar Dwivedi, Ruhul Amin, Ashok Kumar Das, Mark T. Leung, Kim-Kwang Raymond Choo, Satyanarayana Vollala:
Blockchain-based vehicular ad-hoc networks: A comprehensive survey. Ad Hoc Networks 137: 102980 (2022) - [j74]Bimal Kumar Meher, Ruhul Amin:
A location-based multi-factor authentication scheme for mobile devices. Int. J. Ad Hoc Ubiquitous Comput. 41(3): 181-190 (2022) - [j73]Mohammad Abdussami, Ruhul Amin, Satyanarayana Vollala:
LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment. Int. J. Inf. Sec. 21(6): 1373-1387 (2022) - [j72]Priyanka Mall, Ruhul Amin, Ashok Kumar Das, Mark T. Leung, Kim-Kwang Raymond Choo:
PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey. IEEE Internet Things J. 9(11): 8205-8228 (2022) - [j71]C. Madan Kumar, Ruhul Amin, M. Brindha:
SafeCom: Robust mutual authentication and session key sharing protocol for underwater wireless sensor networks. J. Syst. Archit. 130: 102650 (2022) - [j70]Venkatasamy Sureshkumar, S. Mugunthan, Ruhul Amin:
An enhanced mutually authenticated security protocol with key establishment for cloud enabled smart vehicle to grid network. Peer-to-Peer Netw. Appl. 15(5): 2347-2363 (2022) - [j69]Somesh Banerjee, Khilesh Kumar, Prajwal Masulkar, Ruhul Amin, Sanjeev Kumar Dwivedi:
Blockchain and IPFS-based reliable land registry system. Secur. Priv. 5(5) (2022) - [j68]Shivansh Kumar, Ruhul Amin:
Decentralized trade finance using blockchain and lightning network. Secur. Priv. 5(6) (2022) - [j67]Priyanka Mall, Ruhul Amin:
EuDaimon: PUF-Based Robust and Lightweight Authenticated Session Key Establishment Protocol for IoT-Enabled Smart Society. IEEE Syst. J. 16(2): 2891-2898 (2022) - [j66]Bimal Kumar Meher, Ruhul Amin, Ashok Kumar Das, Muhammad Khurram Khan:
KL-RAP: An Efficient Key-Less RFID Authentication Protocol Based on ECDLP for Consumer Warehouse Management System. IEEE Trans. Netw. Sci. Eng. 9(5): 3411-3420 (2022) - [j65]Venkatasamy Sureshkumar, P. Chinnaraj, P. Saravanan, Ruhul Amin, Joel J. P. C. Rodrigues:
Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation. IEEE Trans. Veh. Technol. 71(4): 3470-3479 (2022) - [c15]Sanjeev Kumar Dwivedi, Ruhul Amin, Satyanarayana Vollala:
Design of Blockchain-based Secure Electric Vehicle Charging System Using ECC. CITS 2022: 1-5 - [c14]Isha Pali, Ruhul Amin:
PortSec: Securing Port Knocking System using Sequence Mechanism in SDN Environment. IWCMC 2022: 1009-1014 - 2021
- [j64]Arijit Karati, Ruhul Amin, Prerna Mohit, Venkatasamy Sureshkumar, G. P. Biswas:
Design of a secure file storage and access protocol for cloud-enabled Internet of Things environment. Comput. Electr. Eng. 94: 107298 (2021) - [j63]Priyanka Mall, Ruhul Amin, Mohammad S. Obaidat, Kuei-Fang Hsiao:
CoMSeC++: PUF-based secured light-weight mutual authentication protocol for Drone-enabled WSN. Comput. Networks 199: 108476 (2021) - [j62]Sanjeev Kumar Dwivedi, Ruhul Amin, Satyanarayana Vollala:
Blockchain-Based Secured IPFS-Enable Event Storage Technique With Authentication Protocol in VANET. IEEE CAA J. Autom. Sinica 8(12): 1913-1922 (2021) - [j61]Prerna Mohit, Ruhul Amin, G. P. Biswas:
An e-healthcare authentication protocol employing cloud computing. Int. J. Ad Hoc Ubiquitous Comput. 36(3): 155-168 (2021) - [j60]Ruhul Amin, Isha Pali, Venkatasamy Sureshkumar:
Software-Defined Network enabled Vehicle to Vehicle secured data transmission protocol in VANETs. J. Inf. Secur. Appl. 58: 102729 (2021) - [j59]Khalid Mahmood, Salman Shamshad, Minahil Rana, Akasha Shafiq, Shafiq Ahmad, Muhammad Arslan Akram, Ruhul Amin:
PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communication. J. Inf. Secur. Appl. 61: 102900 (2021) - [j58]Shivansh Kumar, Ruhul Amin:
Mitigating distributed denial of service attack: Blockchain and software-defined networking based approach, network model with future research challenges. Secur. Priv. 4(4) (2021) - [j57]Shivansh Kumar, Aman Kumar Bharti, Ruhul Amin:
Decentralized secure storage of medical records using Blockchain and IPFS: A comparative analysis with future directions. Secur. Priv. 4(5) (2021) - [j56]Sanjeev Kumar Dwivedi, Priyadarshini Roy, Chinky Karda, Shalini Agrawal, Ruhul Amin:
Blockchain-Based Internet of Things and Industrial IoT: A Comprehensive Survey. Secur. Commun. Networks 2021: 7142048:1-7142048:21 (2021) - [j55]Venkatasamy Sureshkumar, S. Anandhi, Ruhul Amin, N. Selvarajan, R. Madhumathi:
Design of Robust Mutual Authentication and Key Establishment Security Protocol for Cloud-Enabled Smart Grid Communication. IEEE Syst. J. 15(3): 3565-3572 (2021) - [j54]Arijit Karati, Ruhul Amin, SK Hafizul Islam, Kim-Kwang Raymond Choo:
Provably Secure and Lightweight Identity-Based Authenticated Data Sharing Protocol for Cyber-Physical Cloud Environment. IEEE Trans. Cloud Comput. 9(1): 318-330 (2021) - [j53]Xinghua Li, Jiao Liu, Mohammad S. Obaidat, Pandi Vijayakumar, Qi Jiang, Ruhul Amin:
An Unlinkable Authenticated Key Agreement With Collusion Resistant for VANETs. IEEE Trans. Veh. Technol. 70(8): 7992-8006 (2021) - [j52]Raveendra Babu Ponnuru, Ruhul Amin, Alavalapati Goutham Reddy, Ashok Kumar Das, Willy Susilo, Youngho Park:
Robust Authentication Protocol for Dynamic Charging System of Electric Vehicles. IEEE Trans. Veh. Technol. 70(11): 11338-11351 (2021) - [c13]Mohammad S. Obaidat, Sanjeev Kumar Dwivedi, Ruhul Amin, Kuei-Fang Hsiao:
Blockchain Enabled Electronics Medical System Proposed Framework with Research Directions. CITS 2021: 1-5 - [c12]Mohammad Rasheed Ahmed, Kandala Meenakshi, Mohammad S. Obaidat, Ruhul Amin, Pandi Vijayakumar:
Blockchain Based Architecture and Solution for Secure Digital Payment System. ICC 2021: 1-6 - 2020
- [j51]Ruhul Amin, Paras Lohani, McLican Ekka, Sunay Chourasia, Satyanarayana Vollala:
An enhanced anonymity resilience security protocol for vehicular ad-hoc network with Scyther simulation. Comput. Electr. Eng. 82: 106554 (2020) - [j50]Sanjeev Kumar Dwivedi, Ruhul Amin, Satyanarayana Vollala, Rashmi Chaudhry:
Blockchain-based secured event-information sharing protocol in internet of vehicles for smart cities. Comput. Electr. Eng. 86: 106719 (2020) - [j49]Fatty M. Salem, Ruhul Amin:
A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS. Inf. Sci. 527: 382-393 (2020) - [j48]Venkatasamy Sureshkumar, Ruhul Amin, Mohammad S. Obaidat, Isswarya Karthikeyan:
An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map. J. Inf. Secur. Appl. 53: 102539 (2020) - [j47]Sanjeev Kumar Dwivedi, Ruhul Amin, Satyanarayana Vollala:
Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism. J. Inf. Secur. Appl. 54: 102554 (2020) - [j46]Sangeetha Rajaram, Tanmoy Maitra, Satyanarayana Vollala, N. Ramasubramanian, Ruhul Amin:
eUASBP: enhanced user authentication scheme based on bilinear pairing. J. Ambient Intell. Humaniz. Comput. 11(7): 2827-2840 (2020) - [j45]Ruhul Amin, Sourav Kunal, Arijit Saha, Debasis Das, Atif Alamri:
CFSec: Password based secure communication protocol in cloud-fog environment. J. Parallel Distributed Comput. 140: 52-62 (2020) - [j44]Siranjeevi Rajamanickam, Satyanarayana Vollala, Ruhul Amin, N. Ramasubramanian:
Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC. IEEE Syst. J. 14(2): 1972-1983 (2020) - [c11]Debasis Das, Ruhul Amin, Sumit Kalra:
Algorithm for Multi Keyword Search Over Encrypted Data in Cloud Environment. IWCMC 2020: 733-739
2010 – 2019
- 2019
- [j43]Venkatasamy Sureshkumar, Ruhul Amin, V. R. Vijaykumar, S. Raja Sekar:
Robust secure communication protocol for smart healthcare system with FPGA implementation. Future Gener. Comput. Syst. 100: 938-951 (2019) - [j42]Sourav Kunal, Arijit Saha, Ruhul Amin:
An overview of cloud-fog computing: Architectures, applications with security challenges. Secur. Priv. 2(4) (2019) - [j41]Arijit Saha, Ruhul Amin, Sourav Kunal, Satyanarayana Vollala, Sanjeev Kumar Dwivedi:
Review on "Blockchain technology based medical healthcare system with privacy issues". Secur. Priv. 2(5) (2019) - [j40]Ruhul Amin, SK Hafizul Islam, Prosanta Gope, Kim-Kwang Raymond Choo, Nachiket Tapas:
Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System. IEEE J. Biomed. Health Informatics 23(4): 1749-1759 (2019) - [j39]Sankar Mukherjee, Ruhul Amin, G. P. Biswas:
Design of routing protocol for multi-sink based wireless sensor networks. Wirel. Networks 25(7): 4331-4347 (2019) - [c10]Satyanarayana Vollala, Utkarsh Tiwari, Ruhul Amin:
A Metric Reckon Algorithm for Bit Forwarding Techniques. iSES 2019: 21-24 - [c9]Anjali Kumari, Md. Zakirul Alam Bhuiyan, Jigyasa Namdeo, Shipra Kanaujia, Ruhul Amin, Satyanarayana Vollala:
Ransomware Attack Protection: A Cryptographic Approach. SpaCCS 2019: 15-25 - [c8]Priyanka Mall, Md. Zakirul Alam Bhuiyan, Ruhul Amin:
A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable Function. SpaCCS 2019: 26-35 - 2018
- [j38]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Mohammad S. Obaidat:
A robust mutual authentication protocol for WSN with multiple base-stations. Ad Hoc Networks 75-76: 1-18 (2018) - [j37]Ruhul Amin, Neeraj Kumar, G. P. Biswas, Rahat Iqbal, Victor I. Chang:
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment. Future Gener. Comput. Syst. 78: 1005-1019 (2018) - [j36]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Neeraj Kumar:
A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener. Comput. Syst. 80: 483-495 (2018) - [j35]Prosanta Gope, Ruhul Amin, SK Hafizul Islam, Neeraj Kumar, Vinod Kumar Bhalla:
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Gener. Comput. Syst. 83: 629-637 (2018) - [j34]Prosanta Gope, SK Hafizul Islam, Mohammad S. Obaidat, Ruhul Amin, Pandi Vijayakumar:
Anonymous and expeditious mobile user authentication scheme for GLOMONET environments. Int. J. Commun. Syst. 31(2) (2018) - [j33]SK Hafizul Islam, Pandi Vijayakumar, Md. Zakirul Alam Bhuiyan, Ruhul Amin, Varun Rajeev M., Balamurugan Balusamy:
A Provably Secure Three-Factor Session Initiation Protocol for Multimedia Big Data Communications. IEEE Internet Things J. 5(5): 3408-3418 (2018) - [j32]Ruhul Amin, SK Hafizul Islam, Neeraj Kumar, Kim-Kwang Raymond Choo:
An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks. J. Netw. Comput. Appl. 104: 133-144 (2018) - [j31]Ruhul Amin, SK Hafizul Islam, Pandi Vijayakumar, Muhammad Khurram Khan, Victor Chang:
A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication. Multim. Tools Appl. 77(9): 11041-11066 (2018) - [j30]Dheerendra Mishra, Pandi Vijayakumar, Venkatasamy Sureshkumar, Ruhul Amin, SK Hafizul Islam, Prosanta Gope:
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multim. Tools Appl. 77(14): 18295-18325 (2018) - [j29]Venkatasamy Sureshkumar, Ruhul Amin, Anitha Ramalingam:
A robust mutual authentication scheme for session initiation protocol with key establishment. Peer-to-Peer Netw. Appl. 11(5): 900-916 (2018) - 2017
- [j28]Venkatasamy Sureshkumar, Anitha Ramalingam, N. Rajamanickam, Ruhul Amin:
A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity. Comput. Electr. Eng. 57: 223-240 (2017) - [j27]Tanmoy Maitra, Mohammad S. Obaidat, Ruhul Amin, SK Hafizul Islam, Shehzad Ashraf Chaudhry, Debasis Giri:
A robust ElGamal-based password-authentication protocol using smart card for client-server communication. Int. J. Commun. Syst. 30(11) (2017) - [j26]Venkatasamy Sureshkumar, Ruhul Amin, Anitha Ramalingam:
An enhanced bilinear pairing based authenticated key agreement protocol for multiserver environment. Int. J. Commun. Syst. 30(17) (2017) - [j25]Ruhul Amin, SK Hafizul Islam, Mohammad S. Obaidat, G. P. Biswas, Kuei-Fang Hsiao:
An anonymous and robust multi-server authentication protocol using multiple registration servers. Int. J. Commun. Syst. 30(18) (2017) - [j24]SK Hafizul Islam, Ruhul Amin, G. P. Biswas, Mohammad Sabzinejad Farash, Xiong Li, Saru Kumari:
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. J. King Saud Univ. Comput. Inf. Sci. 29(3): 311-324 (2017) - [j23]Prerna Mohit, Ruhul Amin, Arijit Karati, G. P. Biswas, Muhammad Khurram Khan:
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System. J. Medical Syst. 41(4): 50:1-50:13 (2017) - [j22]Ruhul Amin, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri, Saru Kumari:
A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments. Secur. Commun. Networks 2017: 5989151:1-5989151:15 (2017) - [j21]Ruhul Amin, R. Simon Sherratt, Debasis Giri, SK Hafizul Islam, Muhammad Khurram Khan:
A software agent enabled biometric security algorithm for secure file access in consumer storage devices. IEEE Trans. Consumer Electron. 63(1): 53-61 (2017) - [j20]Prerna Mohit, Ruhul Amin, G. P. Biswas:
Design of authentication protocol for wireless sensor network-based smart vehicular system. Veh. Commun. 9: 64-71 (2017) - [j19]Chandra Sekhar Vorugunti, Bharavi Mishra, Ruhul Amin, Rakesh P. Badoni, Mrudula Sarvabhatla, Dheerendra Mishra:
Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks. Wirel. Pers. Commun. 95(3): 3141-3166 (2017) - [j18]Ruhul Amin, Tanmoy Maitra, Debasis Giri, P. D. Srivastava:
Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card. Wirel. Pers. Commun. 96(3): 4629-4659 (2017) - [c7]SK Hafizul Islam, Mohammad S. Obaidat, Varun Rajeev M., Ruhul Amin:
Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme. ICMC 2017: 3-15 - [c6]Marimuthu Karuppiah, Akshat Pradhan, Saru Kumari, Ruhul Amin, S. Rajkumar, Rahul Kumar:
Security on "Secure Remote Login Scheme with Password and Smart Card Update Facilities". ICMC 2017: 26-33 - [c5]Prerna Mohit, Ruhul Amin, G. P. Biswas:
Design of Secure and Efficient Electronic Payment System for Mobile Users. ICMC 2017: 34-43 - 2016
- [j17]Ruhul Amin, G. P. Biswas:
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks 36: 58-80 (2016) - [j16]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Lu Leng, Neeraj Kumar:
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput. Networks 101: 42-62 (2016) - [j15]SK Hafizul Islam, Mohammad S. Obaidat, Ruhul Amin:
An anonymous and provably secure authentication scheme for mobile user. Int. J. Commun. Syst. 29(9): 1529-1544 (2016) - [j14]Tanmoy Maitra, Ruhul Amin, Debasis Giri, P. D. Srivastava:
An Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card. Int. J. Netw. Secur. 18(3): 553-564 (2016) - [j13]Prosanta Gope, Ruhul Amin:
A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data. J. Medical Syst. 40(11): 242:1-242:14 (2016) - [j12]Tanmoy Maitra, Mohammad S. Obaidat, SK Hafizul Islam, Debasis Giri, Ruhul Amin:
Security analysis and design of an efficient ECC-based two-factor password authentication scheme. Secur. Commun. Networks 9(17): 4166-4181 (2016) - [j11]Tanmoy Maitra, SK Hafizul Islam, Ruhul Amin, Debasis Giri, Muhammad Khurram Khan, Neeraj Kumar:
An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design. Secur. Commun. Networks 9(17): 4615-4638 (2016) - [j10]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Debasis Giri, Muhammad Khurram Khan, Neeraj Kumar:
A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments. Secur. Commun. Networks 9(17): 4650-4666 (2016) - [c4]Anurag Gupta, Prema Mohit, Arijit Karati, Ruhul Amin, G. P. Biswas:
Malicious node detection using ID-based authentication technique. RAIT 2016: 398-403 - [c3]Ruhul Amin, SK Hafizul Islam, Arijit Karati, G. P. Biswas:
Design of an enhanced authentication protocol and its verification using AVISPA. RAIT 2016: 404-409 - 2015
- [j9]Debasis Giri, Tanmoy Maitra, Ruhul Amin, P. D. Srivastava:
An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems. J. Medical Syst. 39(1): 145 (2015) - [j8]Ruhul Amin, G. P. Biswas:
A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS. J. Medical Syst. 39(3): 33 (2015) - [j7]Ruhul Amin, G. P. Biswas:
A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity. J. Medical Syst. 39(8): 78 (2015) - [j6]Ruhul Amin, G. P. Biswas:
An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS. J. Medical Syst. 39(8): 79 (2015) - [j5]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Mohammad S. Obaidat:
Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System. J. Medical Syst. 39(11): 137:1-137:20 (2015) - [j4]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Xiong Li:
Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems. J. Medical Syst. 39(11): 140:1-140:21 (2015) - [j3]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Neeraj Kumar:
An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography. J. Medical Syst. 39(11): 180 (2015) - [j2]Debasis Giri, R. Simon Sherratt, Tanmoy Maitra, Ruhul Amin:
Efficient biometric and password based mutual authentication for consumer USB mass storage devices. IEEE Trans. Consumer Electron. 61(4): 491-499 (2015) - [j1]Ruhul Amin, G. P. Biswas:
Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment. Wirel. Pers. Commun. 84(1): 439-462 (2015) - [c2]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan:
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks. CyberSA 2015: 1-7 - [c1]Rajeev Kumar, Ruhul Amin, Arijit Karati, G. P. Biswas:
Secure Remote Login Scheme with Password and Smart Card Update Facilities. FICTA 2015: 495-505 - [i1]Ruhul Amin, G. P. Biswas:
Cryptanalysis of a Markov Chain Based User Authentication Scheme. IACR Cryptol. ePrint Arch. 2015: 656 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint