フォロー
Mohammad Sabzinejad Farash
Mohammad Sabzinejad Farash
確認したメール アドレス: khu.ac.ir
タイトル
引用先
引用先
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
MS Farash, M Turkanović, S Kumari, M Hölbl
Ad Hoc Networks 36, 152-176, 2016
5182016
An improved and provably secure privacy preserving authentication protocol for SIP
SA Chaudhry, H Naqvi, M Sher, MS Farash, MU Hassan
Peer-to-Peer Networking and Applications 10, 1-15, 2017
1322017
An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
MS Farash, MA Attari
Nonlinear Dynamics 77, 399-411, 2014
1232014
A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
SA Chaudhry, MS Farash, H Naqvi, M Sher
Electronic Commerce Research 16, 113-139, 2016
1222016
An enhanced privacy preserving remote user authentication scheme with provable security
SA Chaudhry, MS Farash, H Naqvi, S Kumari, MK Khan
Security and Communication Networks 8 (18), 3782-3795, 2015
992015
An improved smart card based authentication scheme for session initiation protocol
S Kumari, SA Chaudhry, F Wu, X Li, MS Farash, MK Khan
Peer-to-Peer Networking and Applications 10, 92-105, 2017
972017
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
MS Farash, SA Chaudhry, M Heydari, SM Sajad Sadough, S Kumari, ...
International Journal of Communication Systems 30 (4), e3019, 2017
932017
Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
MS Farash
Peer-to-Peer Networking and Applications 9, 82-91, 2016
802016
An improved anonymous authentication scheme for distributed mobile cloud computing services
SA Chaudhry, IL Kim, S Rho, MS Farash, T Shon
Cluster Computing 22, 1595-1609, 2019
722019
A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks
MS Farash, MA Attari
The Journal of Supercomputing 69, 395-411, 2014
692014
An enhanced authenticated key agreement for session initiation protocol
MS Farash, MA Attari
Information Technology and Control 42 (4), 333-342, 2013
682013
A provably secure RFID authentication protocol based on elliptic curve for healthcare environments
MS Farash, O Nawaz, K Mahmood, SA Chaudhry, MK Khan
Journal of medical systems 40, 1-7, 2016
622016
Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
MS Farash
The Journal of Supercomputing 70 (2), 987-1001, 2014
622014
An improved and robust biometrics-based three factor authentication scheme for multiserver environments
SA Chaudhry, H Naqvi, MS Farash, T Shon, M Sher
The Journal of Supercomputing 74, 3504-3520, 2018
592018
Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
MS Farash, MA Attari
Nonlinear Dynamics 76, 1203-1213, 2014
582014
An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre
A Irshad, M Sher, SA Chaudhary, H Naqvi, MS Farash
The Journal of Supercomputing 72, 1623-1644, 2016
542016
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments
SKH Islam, R Amin, GP Biswas, MS Farash, X Li, S Kumari
Journal of King Saud University-Computer and Information Sciences 29 (3 …, 2017
502017
Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography
MS Farash, S Kumari, M Bakhtiari
Multimedia Tools and Applications 75, 4485-4504, 2016
442016
An efficient client–client password-based authentication scheme with provable security
MS Farash, MA Attari
The Journal of Supercomputing 70, 1002-1022, 2014
422014
A Pairing-free ID-based Key Agreement Protocol with Different PKGs.
MS Farash, M Ahmadian-Attari
Int. J. Netw. Secur. 16 (2), 143-148, 2014
402014
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20