Follow
Amit K Awasthi (अमित कुमार अवस्थी )
Amit K Awasthi (अमित कुमार अवस्थी )
Verified email at gbu.ac.in - Homepage
Title
Cited by
Cited by
Year
Proxy blind signature scheme
S Lal, AK Awasthi
Cryptology ePrint Archive, Report 72, 2003
181*2003
ID-based ring signature and proxy ring signature schemes from bilinear pairings
AK Awasthi, S Lal
International Journal of Network Security 4 (2), 187-192, 2005
1632005
A remote user authentication scheme using smart cards with forward secrecy
AK Awasthi, S Lal
IEEE Transactions on Consumer Electronics 49 (4), 1246-1248, 2003
1512003
Comment on a dynamic ID-based remote user authentication scheme
AK Awasthi
arXiv preprint cs/0410011, 2004
1022004
An enhanced remote user authentication scheme using smart cards
AK Awasthi, S Lal
IEEE Transactions on Consumer Electronics 50 (2), 583-586, 2004
922004
A hash based mutual RFID tag authentication protocol in telecare medicine information system
K Srivastava, AK Awasthi, SD Kaul, RC Mittal
Journal of medical systems 39, 1-5, 2015
912015
Modeling and analysis of worm propagation in wireless sensor networks
A Singh, AK Awasthi, K Singh, PK Srivastava
Wireless Personal Communications 98, 2535-2551, 2018
642018
Security enhancement of an improved remote user authentication scheme with key agreement
SD Kaul, AK Awasthi
Wireless Personal Communications 89, 621-637, 2016
602016
RFID authentication protocol to enhance patient medication safety
SD Kaul, AK Awasthi
Journal of medical systems 37, 1-6, 2013
292013
Vegetation and climate change around Ropan Chhapra Tal In Deoria district, The Central Ganga Plain during the last 1350 years
A Trivedi, DS Singh, MS Chauhan, A Arya, V Bhardwaj, A Awasthi
Jour. Palaeont. Soc. India 56 (1), 39-43, 2011
252011
Privacy model for threshold RFID system based on PUF
SD Kaul, AK Awasthi
Wireless Personal Communications 95, 2803-2828, 2017
202017
Cryptanalysis and improvement in user authentication and key agreement scheme for wireless sensor network
A Singh, AK Awasthi, K Singh
Wireless Personal Communications 94, 1881-1898, 2017
192017
Quality, reliability, security and robustness in heterogeneous networks
K Singh, A Awasthi
9th International Conference, Qshine, 303, 2013
182013
Security analysis of a dynamic ID-based remote user authentication scheme
AK Awasthi, S Lal
Cryptology ePrint Archive, 2004
182004
Sedimentology and channel pattern of the Chhoti Gandak river, Ganga Plain, India
DS Singh, S Kumar, D Kumar, A Awasthi, V Bhardwaj
Gondwana Geological Magazine 28 (2), 171-180, 2013
162013
An efficient scheme for sensitive message transmission using blind signcryption
AK Awasthi, S Lal
arXiv preprint cs/0504095, 2005
162005
On the Authentication of the User from the Remote Autonomous Object.
AK Awasthi
Int. J. Netw. Secur. 1 (3), 166-167, 2005
152005
A scheme for obtaining a warrant message from the digital proxy signatures
S Lal, AK Awasthi
Cryptology ePrint Archive, 2003
152003
A review on remote user authentication schemes using smart cards
K Srivastava, AK Awasthi, RC Mittal
Quality, Reliability, Security and Robustness in Heterogeneous Networks: 9th …, 2013
112013
A new remote user authentication scheme using smart cards with check digits
AK Awasthi
arXiv preprint cs/0504094, 2005
102005
The system can't perform the operation now. Try again later.
Articles 1–20