Publications
Publications
Publications
- Amit K Awasthi and Sunder Lal. A remote user authentication scheme using smart cards with forward secrecy. IEEE Transactions on Consumer Electronics, 49(4):1246-1248, 2003.
- Amit K Awasthi and Sunder Lal. Id-based ring signature and proxy ring signature schemes from bilinear pairings. International Journal of Network Security, 4(2):187-192, 2005.
- Sunder Lal and Amit Kumar Awasthi. Proxy blind signature scheme. Cryptology ePrint Archive, Report, 72, 2003.
- Amit K Awasthi and Sunder Lal. An enhanced remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 50(2):583-586, 2004.
- Amit K Awasthi. Comment on a dynamic id-based remote user authentication scheme. arXiv preprint cs/0410011, 2004.
- Amit K Awasthi and Sunder Lal. Security analysis of a dynamic id-based remote user authentication scheme. IACR Cryptology ePrint Archive, 2004:238, 2004.
- Amit K Awasthi and Sunder Lal. A new proxy ring signature scheme. arXiv preprint cs/0410010, 2004.
- Amit K Awasthi. On the authentication of the user from the remote autonomous object. IJ Network Security, 1(3):166-167, 2005.
- Sunder Lal and Amit K Awasthi. A scheme for obtaining a warrant message from the digital proxy signatures. IACR Cryptology ePrint Archive, 2003:73, 2003.
- Amit K Awasthi. A new remote user authentication scheme using smart cards with check digits. arXiv preprint cs/0504094, 2005.
- Amit K Awasthi and Sunder Lal. An efficient scheme for sensitive message transmission using blind signcryption. arXiv preprint cs/0504095, 2005.
- Amit K Awasthi and Sunder Lal. A multi-proxy signature scheme for partial delegation with warrant. Arxiv preprint cs/0504093, 2005.
- Amit K Awasthi. On the security of liaw et al.'s scheme. arXiv preprint arXiv:0806.0860, 2008.
- Amit K Awasthi. An improved remote user authentication scheme with smart cards using bilinear pairings. International Journal of Applied Mathematics and Computation, 4(4):382-389, 2012.
- Amit K Awasthi. Remarks on the security of the strong proxy signature scheme with proxy signer privacy protection. International Journal of Information and Computer Security, 4(1):24-29, 2010.
- Keerti Srivastava, Amit K Awasthi, and RC Mittal. An enhanced remote user authentication scheme. IACR Cryptology ePrint Archive, 2010:36, 2010.
- Amit K Awasthi and Sanjay Chaudhary. Non homogeneous poisson process model based optimal modular software testing using fault tolerance. Arxiv preprint arXiv:0904.2769, 2009.
- Keerti Srivastava, Amit K Awasthi, and RC Mittal. A review on remote user authentication schemes using smart cards. In International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, pages 729-749. Springer, Berlin, Heidelberg, 2013.
- Sonam Devgan Kaul and Amit K Awasthi. Analysis and improvement of an authentication scheme using smart cards. In International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, pages 719-728. Springer, Berlin, Heidelberg, 2013.
- Amit K Awasthi and Keerti Srivastava. A biometric authentication scheme for telecare medicine information systems with nonce. Journal of medical systems, 37(5):9964, 2013.
- Sonam Devgan Kaul and Amit K Awasthi. Rfid authentication protocol to enhance patient medication safety. Journal of medical systems, 37(6):9979, 2013.
- Keerti Srivastava, Amit K Awasthi, and RC Mittal. An improved biometric remote user authentication scheme based on nonce.
- Karan Singh and A Awasthi. Quality, reliability, security and robustness in heterogeneous networks, 2013.
- Gaurav Tiwari, Amit K Awasthi, and Neha Shukla. Security analysis of an authentication scheme using smart cards. IACR Cryptology ePrint Archive, 2014:939, 2014.
- Keerti Srivastava, Amit K Awasthi, Sonam D Kaul, and RC Mittal. A hash based mutual rfid tag authentication protocol in telecare medicine information system. Journal of medical systems, 39(1):153, 2015.
- Sonam Devgan Kaul and Amit K Awasthi. Rfid authentication protocol to enhance patient medication safety. Journal of medical systems, 37(6):9979, 2013.
- Sonam Devgan Kaul and Amit K Awasthi. Cryptanalysis of dynamic id based remote user authentication scheme with key agreement. IACR Cryptology ePrint Archive, 2015:490, 2015.
- Amit Kumar Awasthi. A study of some delegated digital signature schemes. 2004.
- Akansha Singh, Amit K Awasthi, and Karan Singh. A key agreement algorithm based on ecdsa for wireless sensor network. In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, pages 143-149. Springer, New Delhi, 2016.
- Sonam Devgan Kaul and Amit K Awasthi. Security enhancement of an improved remote user authentication scheme with key agreement. Wireless Personal Communications, 89(2):621-637, 2016.
- Akansha Singh, Amit K Awasthi, and Karan Singh. Cryptanalysis and improvement in user authentication and key agreement scheme for wireless sensor network. Wireless Personal Communications, 94(3):1881-1898, 2017.
- Akansha Singh, Amit K Awasthi, and Karan Singh. Lightweight multilevel key management scheme for large scale wireless sensor network. In Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on, pages 3014-3017. IEEE, 2016.
- Sonam Devgan Kaul and Amit K Awasthi. Privacy model for threshold rfid system based on puf. Wireless Personal Communications, 95(3):2803-2828, 2017.
- Vishal Saraswat, Rajeev Anand Sahu, and Amit K Awasthi. A secure anonymous proxy signcryption scheme. Journal of Mathematical Cryptology, 11(2):63-84, 2017.
- Sonam Devgan Kaul and Amit K Awasthi. Security flaws in two recently proposed rfid authentication protocols.
- Akansha Singh, Amit K Awasthi, Karan Singh, and Pramod K Srivastava. Modeling and analysis of worm propagation in wireless sensor networks. Wireless Personal Communications, 98(3):2535-2551, 2018.
- Keerti Srivastava, Amit K Awasthi, and RC Mittal. Biometric based rfid tag mutual authentication protocol defending against illegitimate access. Malaya Journal of Matematik (MJM), (1, 2018):102-106, 2018.