A research survey on applications of consensus protocols in blockchain S Kaur, S Chaturvedi, A Sharma, J Kar Security and Communication Networks 2021 (1), 6693731, 2021 | 127 | 2021 |
Public key infrastructure: A survey A Albarqi, E Alzaid, F Al Ghamdi, S Asiri, J Kar Journal of Information Security 6 (01), 31, 2014 | 51 | 2014 |
Provably Secure Online/Off-line Identity-Based Signature Scheme forWireless Sensor Network J Kar Cryptology ePrint Archive, 2012 | 42 | 2012 |
Mitigating threats and security metrics in cloud computing J Kar, MR Mishra Journal of Information Processing Systems 12 (2), 226-233, 2016 | 35 | 2016 |
A study on diffie-hellman key exchange protocols MR Mishra, J Kar International Journal of Pure and Applied Mathematics 114 (2), 179-189, 2017 | 32 | 2017 |
A secure and lightweight protocol for message authentication in wireless sensor networks J Kar, K Naik, T Abdelkader IEEE Systems Journal 15 (3), 3808-3819, 2020 | 30 | 2020 |
Provably secure identity-based aggregate signcryption scheme in random oracles J Kar Cryptology ePrint Archive, 2013 | 30 | 2013 |
ID-CEPPA: Identity-based computationally efficient privacy-preserving authentication scheme for vehicle-to-vehicle communications U Bansal, J Kar, I Ali, K Naik Journal of Systems Architecture 123, 102387, 2022 | 28 | 2022 |
ID-based deniable authentication protocol based on Diffie-Hellman problem on elliptic curve J Kar International Journal of Network Security, Taiwan, 2013 | 22 | 2013 |
EPPDP: an efficient privacy-preserving data possession with provable security in cloud storage N Dhakad, J Kar IEEE Systems Journal 16 (4), 6658-6668, 2022 | 21 | 2022 |
An efficient password security of multi-party Key Exchange Protocol using secret sharing based on ECDLP J Kar, B Majhi, MS Anwer 2010 2nd International Conference on Computer Engineering and Technology 3 …, 2010 | 21 | 2010 |
Conventional and improved digital signature scheme: A comparative study AD Alrehily, AF Alotaibi, SB Almutairy, MS Alqhtani, J Kar Journal of information Security 6 (1), 59-67, 2014 | 19 | 2014 |
CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks J Kar, X Liu, F Li Journal of Information Security and Applications 61, 102905, 2021 | 18 | 2021 |
An efficient and lightweight deniably authenticated encryption scheme for e-mail security J Kar, K Naik, T Abdelkader IEEE Access 7, 184207-184220, 2019 | 16 | 2019 |
A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing technique J Kar, B Majhi Proceedings of the 2011 International Conference on Communication, Computing …, 2011 | 14 | 2011 |
An efficient password security of three party key exchange protocol based on ECDLP J Kar Cryptographic Protocols, 2009 | 13 | 2009 |
Provably secure certificateless deniable authenticated encryption scheme J Kar Journal of Information Security and Applications 54, 102581, 2020 | 11 | 2020 |
Study of the security enhancements in various e-mail systems AS Babrahem, ET Alharbi, AM Alshiky, SS Alqurashi, J Kar Journal of Information Security 6 (1), 1-11, 2014 | 11 | 2014 |
A novel construction of certificateless signcryption scheme for smart card J Kar Case Studies in Secure Computing Achievements and Trends, 437-456, 2014 | 11 | 2014 |
Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks. J Kar IACR Cryptol. ePrint Arch. 2013, 747, 2013 | 9 | 2013 |