Name
Affiliation
Papers
ASHOK KUMAR DAS
International Institute of Information Technology, Bhubaneswar, Bhubaneswar, India
266
Collaborators
Citations 
PageRank 
285
2250
122.93
Referers 
Referees 
References 
2547
4608
5394
Search Limit
1001000
Title
Citations
PageRank
Year
Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for IoT applications00.342022
DDoS attack resisting authentication protocol for mobile based online social network applications00.342022
Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system00.342022
Designing Fine-Grained Access Control for Software-Defined Networks Using Private Blockchain10.352022
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system00.342022
PassWalk: Spatial Authentication Leveraging Lateral Shift and Gaze on Mobile Headsets00.342022
Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions00.342022
Uniting cyber security and machine learning: Advantages, challenges and future research00.342022
SLAP-IoD: Secure and Lightweight Authentication Protocol Using Physical Unclonable Functions for Internet of Drones in Smart City Environments00.342022
On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System40.372021
SDN-chain: Privacy-preserving protocol for software defined networks using blockchain00.342021
Private Blockchain-Envisioned Multi-Authority Cp-Abe-Based User Access Control Scheme In Iiot00.342021
SPCS-IoTEH: Secure Privacy-Preserving Communication Scheme for IoT-Enabled e-Health Applications00.342021
An Enhanced Lightweight And Secured Authentication Protocol For Vehicular Ad-Hoc Network10.352021
Laptas: Lightweight Anonymous Privacy-Preserving Three-Factor Authentication Scheme For Wsn-Based Iiot10.352021
Private Blockchain-Based Access Control Mechanism For Unauthorized Uav Detection And Mitigation In Internet Of Drones Environment50.472021
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters00.342021
On The Design Of Secure Communication Framework For Blockchain-Based Internet Of Intelligent Battlefield Things Environment00.342020
LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment90.432020
A Smart Waste Management Solution Geared towards Citizens.10.352020
On the Design of Blockchain-Based Access Control Protocol for IoT-Enabled Healthcare Applications10.352020
Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment30.382020
Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment.00.342020
Cache Poisoning Prevention Scheme In 5g-Enabled Vehicular Networks: A Tangle-Based Theoretical Perspective00.342020
Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges.20.392020
On the Design of Blockchain-Based Access Control Scheme for Software Defined Networks10.352020
Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment140.532020
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment.80.412020
On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment60.392020
Authentication in cloud-driven IoT-based big data environment: Survey and outlook40.452019
User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions00.342019
Design of secure key management and user authentication scheme for fog computing services.150.552019
Design And Analysis Of Secure Lightweight Remote User Authentication And Key Agreement Scheme In Internet Of Drones Deployment60.392019
ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System.30.382019
Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications.70.442019
Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions.30.392019
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.10.352019
A Provably Secure And Lightweight Anonymous User Authenticated Session Key Exchange Scheme For Internet Of Things Deployment30.362019
Iomt Malware Detection Approaches: Analysis And Research Challenges00.342019
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment20.382019
Taxonomy and analysis of security protocols for Internet of Things.60.482018
Demand Response Management Using Lattice-Based Cryptography in Smart Grids.00.342018
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.170.572018
Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography.70.422018
Secure Message Communication Protocol Among Vehicles in Smart City.140.482018
Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things.170.542018
Mixed Unit Interval Bigraphs.00.342018
Provably Secure Authenticated Key Agreement Scheme for Smart Grid.120.522018
HEAP: An Efficient and Fault-Tolerant Authentication and Key Exchange Protocol for Hadoop-Assisted Big Data Platform.00.342018
2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment.40.382018
  • 1
  • 2