default search action
Mohammad Wazid
Person information
- affiliation: Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j85]Siddhant Thapliyal, Mohammad Wazid, Devesh Pratap Singh, Ramji Chauhan, Amit Kumar Mishra, Ashok Kumar Das:
Secure Artificial Intelligence of Things (AIoT)-enabled authenticated key agreement technique for smart living environment. Comput. Electr. Eng. 118: 109353 (2024) - [j84]Mohammad Wazid, Amit Kumar Mishra, Noor Mohd, Ashok Kumar Das:
A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact. Cyber Secur. Appl. 2: 100040 (2024) - [j83]Mohammad Wazid, Ashok Kumar Das, Youngho Park:
Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future Research. IEEE Open J. Comput. Soc. 5: 248-267 (2024) - [j82]Vijay Karnatak, Amit Kumar Mishra, Neha Tripathi, Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das:
A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications. Secur. Priv. 7(2) (2024) - [j81]Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues:
An Ensemble-Based Machine Learning-Envisioned Intrusion Detection in Industry 5.0-Driven Healthcare Applications. IEEE Trans. Consumer Electron. 70(1): 1903-1912 (2024) - [j80]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty:
An Authentication and Key Management Framework for Secure and Intelligent Transportation of Internet of Space Things. IEEE Trans. Intell. Transp. Syst. 25(6): 5242-5257 (2024) - [j79]Amit Kumar Mishra, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sandip Roy, Sachin Shetty:
ACKS-IA: An Access Control and Key Agreement Scheme for Securing Industry 4.0 Applications. IEEE Trans. Netw. Sci. Eng. 11(1): 254-269 (2024) - [c19]Manav Pankaj Jariwala, Mohammad S. Obaidat, Mohammad Wazid, Amit Kumar Mishra, Devesh Pratap Singh:
Designing Blockchain-Based Decentralized Scheme for Secure File Storage System. CITS 2024: 1-7 - [c18]Sourav Saha, Ashok Kumar Das, Saksham Mittal, Mohammad Wazid:
Designing Secure Big Data Analytics Mechanism Using Authentication for Drones-Assisted Military Applications. INFOCOM (Workshops) 2024: 1-6 - 2023
- [j78]Siddhant Thapliyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty, Abdullah Alqahtani:
Design of Robust Blockchain-Envisioned Authenticated Key Management Mechanism for Smart Healthcare Applications. IEEE Access 11: 93032-93047 (2023) - [j77]Jaskaran Singh, Keshav Sharma, Mohammad Wazid, Ashok Kumar Das:
SINN-RD: Spline interpolation-envisioned neural network-based ransomware detection scheme. Comput. Electr. Eng. 106: 108601 (2023) - [j76]Siddhant Thapliyal, Shubham Singh, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das:
Design of blockchain-enabled secure smart health monitoring system and its testbed implementation. Cyber Secur. Appl. 1: 100020 (2023) - [j75]Neha Garg, Rajat Petwal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues:
On the design of an AI-driven secure communication scheme for internet of medical things environment. Digit. Commun. Networks 9(5): 1080-1089 (2023) - [j74]Siddhant Thapliyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, SK Hafizul Islam:
Robust authenticated key agreement protocol for internet of vehicles-envisioned intelligent transportation system. J. Syst. Archit. 142: 102937 (2023) - [j73]Sumit Pundir, Mohammad S. Obaidat, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh, Joel J. P. C. Rodrigues:
MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach. Multim. Syst. 29(3): 1785-1797 (2023) - [j72]Jaskaran Singh, Keshav Sharma, Mohammad Wazid, Ashok Kumar Das, Athanasios V. Vasilakos:
An Ensemble-Based IoT-Enabled Drones Detection Scheme for a Safe Community. IEEE Open J. Commun. Soc. 4: 1946-1956 (2023) - [j71]Pankaj Kumar, Mohammad Wazid, Devesh Pratap Singh, Jaskaran Singh, Ashok Kumar Das, Youngho Park, Joel J. P. C. Rodrigues:
Explainable artificial intelligence envisioned security mechanism for cyber threat hunting. Secur. Priv. 6(6) (2023) - [j70]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty:
BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare. IEEE Trans. Consumer Electron. 69(1): 18-28 (2023) - [j69]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Mohsen Guizani:
AISCM-FH: AI-Enabled Secure Communication Mechanism in Fog Computing-Based Healthcare. IEEE Trans. Inf. Forensics Secur. 18: 319-334 (2023) - [j68]Mohammad Wazid, Siddhant Thapliyal, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty:
Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems. IEEE Trans. Netw. Sci. Eng. 10(5): 2697-2709 (2023) - [j67]Mohammad Wazid, Prosanta Gope:
BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications. ACM Trans. Internet Techn. 23(3): 39:1-39:28 (2023) - [c17]Pankaj Kumar, Mohammad S. Obaidat, Piyush Pandey, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh:
Design of a Secure Machine Learning-Based Malware Detection and Analysis Scheme. CCCI 2023: 1-8 - [c16]Bhairvi Pant, Mohammad S. Obaidat, Shreya Singh, Mudita Pant, Mohammad Wazid, Ashok Kumar Das, Kuei-Fang Hsiao:
SLA-SCA: Secure and Lightweight Authentication and Key Agreement Mechanism for Smart City Applications. CCCI 2023: 1-7 - [c15]Surabhi Gusain Rawat, Mohammad S. Obaidat, Sumit Pundir, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh, Kuei-Fang Hsiao:
A Survey of DDoS Attacks Detection Schemes in SDN Environment. CITS 2023: 1-6 - [c14]Saksham Mittal, Amit Kumar Mishra, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty:
Multiclass Classification Approaches for Intrusion Detection in IoT-Driven Aerial Computing Environment. GLOBECOM 2023: 2160-2165 - [c13]Amit Kumar Mishra, Mohammad S. Obaidat, Harshit Bhajpai, Pranjal Trivedi, Mohammad Wazid, Devesh Pratap Singh, Joel J. P. C. Rodrigues, Balqies Sadoun:
Ransomware Attacks Detection Methodology to Protect IoT-Enabled Critical Infrastructures. GLOBECOM 2023: 6037-6042 - [c12]Darshan Singh, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues:
Embattle The Security of E-Health System Through A Secure Authentication and Key Agreement Protocol. IWCMC 2023: 1130-1135 - [c11]Amit Kumar Mishra, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Mohsen Guizani:
Securing Fog Computing-based Industry 4.0 Communication Using Authenticated Key Agreement Scheme. IWCMC 2023: 1448-1453 - 2022
- [j66]Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, Sachin Shetty, Muhammad Khurram Khan, Joel J. P. C. Rodrigues:
ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things. IEEE Access 10: 57990-58004 (2022) - [j65]Mohammad Wazid, Ashok Kumar Das, Noor Mohd, Youngho Park:
Healthcare 5.0 Security Framework: Applications, Issues and Future Research Directions. IEEE Access 10: 129429-129442 (2022) - [j64]Noor Mohd, Annapurna Singh, Harvendra Singh Bhadauria, Mohammad Wazid:
An efficient node placement scheme to mitigate routing attacks in Internet of Battlefield Things. Comput. Electr. Eng. 97: 107623 (2022) - [j63]Jaskaran Singh, Mohammad Wazid, Ashok Kumar Das, Vinay Chamola, Mohsen Guizani:
Machine learning security attacks and defense approaches for emerging cyber physical applications: A comprehensive survey. Comput. Commun. 192: 316-331 (2022) - [j62]Mohammad Wazid, Ashok Kumar Das, Youngho Park:
Blockchain-enabled secure communication mechanism for IoT-driven personal health records. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j61]Mohammad Wazid, Ashok Kumar Das, Vinay Chamola, Youngho Park:
Uniting cyber security and machine learning: Advantages, challenges and future research. ICT Express 8(3): 313-321 (2022) - [j60]Mohammad Wazid, Ashok Kumar Das, Kim-Kwang Raymond Choo, Youngho Park:
SCS-WoT: Secure Communication Scheme for Web of Things Deployment. IEEE Internet Things J. 9(13): 10411-10423 (2022) - [j59]Mohammad Wazid, Basudeb Bera, Ashok Kumar Das, Saraju P. Mohanty, Minho Jo:
Fortifying Smart Transportation Security Through Public Blockchain. IEEE Internet Things J. 9(17): 16532-16545 (2022) - [j58]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty:
TACAS-IoT: Trust Aggregation Certificate-Based Authentication Scheme for Edge-Enabled IoT Systems. IEEE Internet Things J. 9(22): 22643-22656 (2022) - [j57]Mohammad Wazid, Ashok Kumar Das, Rasheed Hussain, Neeraj Kumar, Sandip Roy:
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system. J. Syst. Archit. 123: 102370 (2022) - [j56]Neha Garg, Mohammad Wazid, Jaskaran Singh, Devesh Pratap Singh, Ashok Kumar Das:
Security in IoMT-driven smart healthcare: A comprehensive review and open challenges. Secur. Priv. 5(5) (2022) - [c10]Naivedya Lath, Kaustubh Thapliyal, Kartik Kandpal, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh:
BDESF-ITS: Blockchain-Based Secure Data Exchange and Storage Framework for Intelligent Transportation System. INFOCOM Workshops 2022: 1-6 - [c9]Amarjit Sripesh, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Bharat Verma:
BAKP-IoDA: blockchain driven authentication and key agreement protocol for internet of drones based applications. DroneCom@MobiCom 2022: 25-30 - 2021
- [j55]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Prosanta Gope, Joel J. P. C. Rodrigues:
Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap. IEEE Access 9: 4466-4489 (2021) - [j54]Ashok Kumar Das, Basudeb Bera, Mohammad Wazid, Sajjad Shaukat Jamal, Youngho Park:
On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure. IEEE Access 9: 71856-71867 (2021) - [j53]Ashok Kumar Das, Basudeb Bera, Mohammad Wazid, Sajjad Shaukat Jamal, Youngho Park:
iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment. IEEE Access 9: 87024-87048 (2021) - [j52]Jangirala Srinivas, Ashok Kumar Das, Mohammad Wazid, Athanasios V. Vasilakos:
Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System. IEEE Internet Things J. 8(9): 7727-7744 (2021) - [j51]Mohammad Wazid, Basudeb Bera, Ashok Kumar Das, Sahil Garg, Dusit Niyato, M. Shamim Hossain:
Secure Communication Framework for Blockchain-Based Internet of Drones-Enabled Aerial Computing Deployment. IEEE Internet Things Mag. 4(3): 120-126 (2021) - [j50]Basudeb Bera, Mohammad Wazid, Ashok Kumar Das, Joel J. P. C. Rodrigues:
Securing Internet of Drones Networks Using AI-Envisioned Smart-Contract-Based Blockchain. IEEE Internet Things Mag. 4(4): 68-73 (2021) - [j49]Rahul Sharma, Mohammad Wazid, Prosanta Gope:
A blockchain based secure communication framework for community interaction. J. Inf. Secur. Appl. 58: 102790 (2021) - [j48]Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Mamoun Alazab:
Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications. IEEE Trans. Ind. Informatics 17(10): 7174-7184 (2021) - [j47]Palak Bagga, Ashok Kumar Das, Mohammad Wazid, Joel J. P. C. Rodrigues, Kim-Kwang Raymond Choo, YoungHo Park:
On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System. IEEE Trans. Veh. Technol. 70(2): 1736-1751 (2021) - [c8]Neha Garg, Mohammad S. Obaidat, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh:
SPCS-IoTEH: Secure Privacy-Preserving Communication Scheme for IoT-Enabled e-Health Applications. ICC 2021: 1-6 - 2020
- [j46]Sumit Pundir, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues, Youngho Park:
Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges. IEEE Access 8: 3343-3363 (2020) - [j45]Palak Bagga, Ashok Kumar Das, Mohammad Wazid, Joel J. P. C. Rodrigues, Youngho Park:
Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges. IEEE Access 8: 54314-54344 (2020) - [j44]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo:
A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things. IEEE Access 8: 88700-88716 (2020) - [j43]Neha Garg, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh, Joel J. P. C. Rodrigues, Youngho Park:
BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment. IEEE Access 8: 95956-95977 (2020) - [j42]Kisung Park, Sungkee Noh, Hyunjin Lee, Ashok Kumar Das, MyeongHyun Kim, Youngho Park, Mohammad Wazid:
LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things. IEEE Access 8: 119387-119404 (2020) - [j41]Mohammad Wazid, Ashok Kumar Das, Vivekananda Bhat K., Athanasios V. Vasilakos:
LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment. J. Netw. Comput. Appl. 150 (2020) - [j40]Sumit Pundir, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues, Youngho Park:
Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment. Sensors 20(5): 1300 (2020) - [j39]Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Willy Susilo:
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE Trans. Dependable Secur. Comput. 17(2): 391-406 (2020) - [j38]Jangirala Srinivas, Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar:
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things. IEEE Trans. Dependable Secur. Comput. 17(6): 1133-1146 (2020) - [c7]Mohammad Wazid, Mohammad S. Obaidat, Ashok Kumar Das, Pandi Vijayakumar:
SAC-FIIoT: Secure Access Control Scheme for Fog-Based Industrial Internet of Things. GLOBECOM 2020: 1-6 - [c6]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues:
On the Design of Secure Communication Framework for Blockchain-Based Internet of Intelligent Battlefield Things Environment. INFOCOM Workshops 2020: 888-893 - [c5]Mohammad Wazid, Basudeb Bera, Ankush Mitra, Ashok Kumar Das, Rashid Ali:
Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services. DroneCom@MobiCom 2020: 37-42
2010 – 2019
- 2019
- [j37]Ashok Kumar Das, Mohammad Wazid, Animi Reddy Yannam, Joel J. P. C. Rodrigues, Youngho Park:
Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment. IEEE Access 7: 55382-55397 (2019) - [j36]Mohammad Wazid, Ashok Kumar Das, Joel J. P. C. Rodrigues, Sachin Shetty, Youngho Park:
IoMT Malware Detection Approaches: Analysis and Research Challenges. IEEE Access 7: 182459-182476 (2019) - [j35]Mohammad Wazid, Sherali Zeadally, Ashok Kumar Das:
Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions. IEEE Consumer Electron. Mag. 8(2): 56-60 (2019) - [j34]Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Athanasios V. Vasilakos:
Design of secure key management and user authentication scheme for fog computing services. Future Gener. Comput. Syst. 91: 475-492 (2019) - [j33]Mohammad Wazid, Poonam Reshma Dsouza, Ashok Kumar Das, Vivekananda Bhat K., Neeraj Kumar, Joel J. P. C. Rodrigues:
RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment. Int. J. Commun. Syst. 32(15) (2019) - [j32]Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues:
Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment. IEEE Internet Things J. 6(2): 3572-3584 (2019) - [j31]Mohammad Wazid, Palak Bagga, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park:
AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment. IEEE Internet Things J. 6(5): 8804-8817 (2019) - [j30]Mohammad Wazid, Ashok Kumar Das, Rasheed Hussain, Giancarlo Succi, Joel J. P. C. Rodrigues:
Authentication in cloud-driven IoT-based big data environment: Survey and outlook. J. Syst. Archit. 97: 185-196 (2019) - [j29]Mohammad Wazid, Ashok Kumar Das, Jong-Hyouk Lee:
User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions. Pervasive Mob. Comput. 54: 71-85 (2019) - [j28]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park:
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment. Sensors 19(24): 5539 (2019) - 2018
- [j27]Sravani Challa, Mohammad Wazid, Ashok Kumar Das, Muhammad Khurram Khan:
Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions. IEEE Consumer Electron. Mag. 7(1): 57-65 (2018) - [j26]Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Mauro Conti, Minho Jo:
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks. IEEE Internet Things J. 5(1): 269-282 (2018) - [j25]Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues:
Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment. IEEE Internet Things J. 5(6): 4900-4913 (2018) - [j24]Mohammad Wazid, Ashok Kumar Das, Athanasios V. Vasilakos:
Authenticated key management protocol for cloud-assisted body area sensor networks. J. Netw. Comput. Appl. 123: 112-126 (2018) - [j23]Vanga Odelu, Sherali Zeadally, Ashok Kumar Das, Mohammad Wazid, Debiao He:
A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks. Telecommun. Syst. 69(4): 431-445 (2018) - [j22]Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Mauro Conti, Athanasios V. Vasilakos:
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment. IEEE J. Biomed. Health Informatics 22(4): 1299-1309 (2018) - [j21]Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, YoungHo Park:
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment. IEEE J. Biomed. Health Informatics 22(4): 1310-1322 (2018) - [j20]Vanga Odelu, Ashok Kumar Das, Mohammad Wazid, Mauro Conti:
Provably Secure Authenticated Key Agreement Scheme for Smart Grid. IEEE Trans. Smart Grid 9(3): 1900-1910 (2018) - 2017
- [j19]Sravani Challa, Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Goutham Reddy Alavalapati, Eun-Jun Yoon, Kee-Young Yoo:
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications. IEEE Access 5: 3028-3043 (2017) - [j18]Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Vanga Odelu, Goutham Reddy Alavalapati, Kisung Park, Youngho Park:
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks. IEEE Access 5: 14966-14980 (2017) - [j17]Ashok Kumar Das, Sherali Zeadally, Mohammad Wazid:
Lightweight authentication protocols for wearable devices. Comput. Electr. Eng. 63: 196-208 (2017) - [j16]Saru Kumari, Ashok Kumar Das, Mohammad Wazid, Xiong Li, Fan Wu, Kim-Kwang Raymond Choo, Muhammad Khurram Khan:
On the design of a secure user authentication and key agreement scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j15]Vanga Odelu, Ashok Kumar Das, Saru Kumari, Xinyi Huang, Mohammad Wazid:
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Gener. Comput. Syst. 68: 74-88 (2017) - [j14]Mohammad Wazid, Ashok Kumar Das, Muhammad Khurram Khan, Abdulatif Al-Dhawailie Al-Ghaiheb, Neeraj Kumar, Athanasios V. Vasilakos:
Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment. IEEE Internet Things J. 4(5): 1634-1646 (2017) - [j13]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Jian Shen, Kim-Kwang Raymond Choo, Mohammad Wazid, Ashok Kumar Das:
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 89: 72-85 (2017) - [j12]Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues:
Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment. IEEE Trans. Ind. Informatics 13(6): 3144-3153 (2017) - [j11]Mohammad Wazid, Ashok Kumar Das:
A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks. Wirel. Pers. Commun. 94(3): 1165-1191 (2017) - 2016
- [j10]Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, Mohammad Wazid, Vanga Odelu:
Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput. Methods Programs Biomed. 135: 37-50 (2016) - [j9]Anil Kumar Sutrala, Ashok Kumar Das, Vanga Odelu, Mohammad Wazid, Saru Kumari:
Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems. Comput. Methods Programs Biomed. 135: 167-185 (2016) - [j8]Mohammad Wazid, Sherali Zeadally, Ashok Kumar Das, Vanga Odelu:
Analysis of Security Protocols for Mobile Healthcare. J. Medical Syst. 40(11): 229:1-229:10 (2016) - [j7]Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li, Fan Wu:
Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS. Secur. Commun. Networks 9(13): 1983-2001 (2016) - [j6]Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid, Xiong Li:
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Secur. Commun. Networks 9(13): 2070-2092 (2016) - [j5]Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li, Fan Wu:
Provably secure biometric-based user authentication and key agreement scheme in cloud computing. Secur. Commun. Networks 9(17): 4103-4119 (2016) - [j4]Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Muhammad Khurram Khan:
Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Secur. Commun. Networks 9(17): 4596-4614 (2016) - [j3]Mohammad Wazid, Ashok Kumar Das:
An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks. Wirel. Pers. Commun. 90(4): 1971-2000 (2016) - [j2]Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay, Mohammad Wazid:
A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography. Wirel. Pers. Commun. 91(3): 1361-1391 (2016) - 2015
- [j1]Anchit Bijalwan, Mohammad Wazid, Emmanuel S. Pilli, Ramesh Chandra Joshi:
Forensics of Random-UDP Flooding Attacks. J. Networks 10(5): 287-293 (2015) - 2014
- [i1]Mohammad Wazid:
Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks. IACR Cryptol. ePrint Arch. 2014: 712 (2014) - 2013
- [c4]Avita Katal, Mohammad Wazid, R. H. Goudar:
Big data: Issues, challenges, tools and Good practices. IC3 2013: 404-409 - [c3]Mohammad Wazid, Robin Sharma, Avita Katal, R. H. Goudar, Priyanka Bhakuni, Asit Tyagi:
Implementation and Embellishment of Prevention of Keylogger Spyware Attacks. SSCC 2013: 262-271 - 2012
- [c2]Mohammad Wazid, Roshan Singh Sachan, R. H. Goudar:
Performance of a LAN under different ethernet wiring standards. CUBE 2012: 166-172 - [c1]Avita Katal, Mohammad Wazid, R. H. Goudar:
Efficient Protocol Prediction Algorithm for MANET Multimedia Transmission Under JF Periodic Dropping Attack. SocProS 2012: 419-428
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint