Proxy blind signature scheme S Lal, AK Awasthi Cryptology ePrint Archive, Report 72, 2003 | 181* | 2003 |
ID-based ring signature and proxy ring signature schemes from bilinear pairings AK Awasthi, S Lal International Journal of Network Security 4 (2), 187-192, 2005 | 163 | 2005 |
A remote user authentication scheme using smart cards with forward secrecy AK Awasthi, S Lal IEEE Transactions on Consumer Electronics 49 (4), 1246-1248, 2003 | 151 | 2003 |
Comment on a dynamic ID-based remote user authentication scheme AK Awasthi arXiv preprint cs/0410011, 2004 | 102 | 2004 |
An enhanced remote user authentication scheme using smart cards AK Awasthi, S Lal IEEE Transactions on Consumer Electronics 50 (2), 583-586, 2004 | 92 | 2004 |
A hash based mutual RFID tag authentication protocol in telecare medicine information system K Srivastava, AK Awasthi, SD Kaul, RC Mittal Journal of medical systems 39, 1-5, 2015 | 91 | 2015 |
Modeling and analysis of worm propagation in wireless sensor networks A Singh, AK Awasthi, K Singh, PK Srivastava Wireless Personal Communications 98, 2535-2551, 2018 | 64 | 2018 |
Security enhancement of an improved remote user authentication scheme with key agreement SD Kaul, AK Awasthi Wireless Personal Communications 89, 621-637, 2016 | 60 | 2016 |
RFID authentication protocol to enhance patient medication safety SD Kaul, AK Awasthi Journal of medical systems 37, 1-6, 2013 | 29 | 2013 |
Vegetation and climate change around Ropan Chhapra Tal In Deoria district, The Central Ganga Plain during the last 1350 years A Trivedi, DS Singh, MS Chauhan, A Arya, V Bhardwaj, A Awasthi Jour. Palaeont. Soc. India 56 (1), 39-43, 2011 | 25 | 2011 |
Privacy model for threshold RFID system based on PUF SD Kaul, AK Awasthi Wireless Personal Communications 95, 2803-2828, 2017 | 20 | 2017 |
Cryptanalysis and improvement in user authentication and key agreement scheme for wireless sensor network A Singh, AK Awasthi, K Singh Wireless Personal Communications 94, 1881-1898, 2017 | 19 | 2017 |
Quality, reliability, security and robustness in heterogeneous networks K Singh, A Awasthi 9th International Conference, Qshine, 303, 2013 | 18 | 2013 |
Security analysis of a dynamic ID-based remote user authentication scheme AK Awasthi, S Lal Cryptology ePrint Archive, 2004 | 18 | 2004 |
Sedimentology and channel pattern of the Chhoti Gandak river, Ganga Plain, India DS Singh, S Kumar, D Kumar, A Awasthi, V Bhardwaj Gondwana Geological Magazine 28 (2), 171-180, 2013 | 16 | 2013 |
An efficient scheme for sensitive message transmission using blind signcryption AK Awasthi, S Lal arXiv preprint cs/0504095, 2005 | 16 | 2005 |
On the Authentication of the User from the Remote Autonomous Object. AK Awasthi Int. J. Netw. Secur. 1 (3), 166-167, 2005 | 15 | 2005 |
A scheme for obtaining a warrant message from the digital proxy signatures S Lal, AK Awasthi Cryptology ePrint Archive, 2003 | 15 | 2003 |
A review on remote user authentication schemes using smart cards K Srivastava, AK Awasthi, RC Mittal Quality, Reliability, Security and Robustness in Heterogeneous Networks: 9th …, 2013 | 11 | 2013 |
A new remote user authentication scheme using smart cards with check digits AK Awasthi arXiv preprint cs/0504094, 2005 | 10 | 2005 |