A secure and efficient cloud-centric internet-of-medical-things-enabled smart healthcare system with public verifiability M Kumar, S Chand IEEE Internet of Things Journal 7 (10), 10650-10659, 2020 | 113 | 2020 |
A lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network M Kumar, S Chand IEEE Systems Journal 15 (2), 2779-2786, 2020 | 91 | 2020 |
MedHypChain: A patient-centered interoperability hyperledger-based medical healthcare system: Regulation in COVID-19 pandemic M Kumar, S Chand Journal of Network and Computer Applications 179, 102975, 2021 | 84 | 2021 |
A secure anonymous e-voting system using identity-based blind signature scheme M Kumar, CP Katti, PC Saxena Information Systems Security: 13th International Conference, ICISS 2017 …, 2017 | 48 | 2017 |
A secure end-to-end verifiable internet-voting system using identity-based blind signature M Kumar, S Chand, CP Katti IEEE Systems Journal 14 (2), 2032-2041, 2020 | 47 | 2020 |
ESKI-IBE: Efficient and secure key issuing identity-based encryption with cloud privacy centers M Kumar, S Chand Multimedia Tools and Applications 78, 19753-19786, 2019 | 31 | 2019 |
An untraceable identity-based blind signature scheme without pairing for e-cash payment system M Kumar, CP Katti, PC Saxena Ubiquitous Communications and Network Computing: First International …, 2018 | 19 | 2018 |
An identity-based blind signature approach for e-voting system M Kumar, CP Katti, PC Saxena International Journal of Modern Education and Computer Science 9 (10), 47, 2017 | 17 | 2017 |
A provable secure and lightweight smart healthcare cyber-physical system with public verifiability M Kumar, S Chand IEEE Systems Journal 16 (4), 5501-5508, 2021 | 14 | 2021 |
An efficient ID-based partially blind signature scheme and application in electronic-cash payment system M Kumar, CP Katti Accent. Trans. Inf. Secur 2 (6), 36-42, 2016 | 13 | 2016 |
Cryptanalysis and improvement of anonymous authentication for wireless body area networks with provable security M Kumar Cryptology ePrint Archive, 2020 | 10 | 2020 |
A new blind signature scheme using identity-based technique M Kumar, CP Katti, PC Saxena Int. J. Control Theory Appl 10 (15), 36-42, 2017 | 10 | 2017 |
An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage M Kumar, C Maple, S Chand Journal of King Saud University-Computer and Information Sciences 35 (9), 101745, 2023 | 9 | 2023 |
An ID-based authenticated key exchange protocol M Kumar, CP Katti, PC Saxena International Journal of Advanced Studies in Computers, Science and …, 2015 | 9 | 2015 |
Escrow-less identity-based signature scheme with outsourced protection in cloud computing M Kumar, S Chand Wireless Personal Communications 114, 3115-3136, 2020 | 6 | 2020 |
SecP2PVoD: A secure peer-to-peer video-on-demand system against pollution attack and untrusted service provider M Kumar, S Chand Multimedia Tools and Applications 79 (9), 6163-6190, 2020 | 6 | 2020 |
A pairing-less identity-based blind signature with message recovery scheme for cloud-assisted services M Kumar, S Chand International conference on information security and cryptology, 419-434, 2019 | 6 | 2019 |
PF-AID-2KAP: Pairing-free authenticated identity-based two-party key agreement protocol for resource-constrained devices M Kumar, PC Saxena Futuristic Trends in Network and Communication Technologies: First …, 2019 | 6 | 2019 |
SAI-BA-IoMT: Secure AI-based blockchain-assisted internet of medical things tool to moderate the outbreak of COVID-19 crisis M Kumar, R Rani arXiv preprint arXiv:2108.09539, 2021 | 5 | 2021 |
Leveraging semantic relationships to prioritise indicators of compromise in additive manufacturing systems M Kumar, G Epiphaniou, C Maple International Conference on Applied Cryptography and Network Security, 321-335, 2023 | 4 | 2023 |