• Chanda S, Luhach A, Francis J, Sengupta I, Roy D and Fernandez-Veiga M. (2024). An Elliptic Curve Menezes–Qu–Vanston-Based Authentication and Encryption Protocol for IoT. Wireless Communications & Mobile Computing. 2024. Online publication date: 1-Jan-2024.

    https://doi.org/10.1155/2024/5998163

  • Mahmood K, Shamshad S, Ayub M, Ghaffar Z, Khan M and Das A. (2023). Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System. IEEE Transactions on Intelligent Transportation Systems. 24:12. (14536-14545). Online publication date: 1-Dec-2023.

    https://doi.org/10.1109/TITS.2023.3295818

  • Kumar V, Ray S, Sadhukhan D, Karmakar J and Dasgupta M. (2023). Enhanced pairing‐free identity‐based broadcast authentication protocol in WSN using ElGamal ECC. Security and Privacy. 6:3. Online publication date: 8-May-2023.

    https://doi.org/10.1002/spy2.278

  • Liu D, Liu X, Wang R, Zhang H, Zhang F, Sun L, Yao H, Yu H and Li Z. (2023). A Multi-Blockchain-Based Cross-Domain Authentication and Authorization Scheme for Energy Internet. Wireless Communications & Mobile Computing. 2023. Online publication date: 1-Jan-2023.

    https://doi.org/10.1155/2023/4778967

  • Fan C, Hsu Y, Shie C and Tseng Y. (2022). ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning. ACM Transactions on Sensor Networks. 18:4. (1-25). Online publication date: 30-Nov-2022.

    https://doi.org/10.1145/3540199

  • Hundera N, Jin C, Geressu D, Aftab M, Olanrewaju O and Xiong H. (2022). Proxy-based public-key cryptosystem for secure and efficient IoT-based cloud data sharing in the smart city. Multimedia Tools and Applications. 81:21. (29673-29697). Online publication date: 1-Sep-2022.

    https://doi.org/10.1007/s11042-021-11685-3

  • Hussain S, Ullah S and Ali I. (2022). An efficient content source verification scheme for multi-receiver in NDN-based Internet of Things. Cluster Computing. 25:3. (1749-1764). Online publication date: 1-Jun-2022.

    https://doi.org/10.1007/s10586-021-03384-3

  • Liu S, Shao Y, Luo H, Di H and Zhou Z. (2022). IBE-Signal. Security and Communication Networks. 2022. Online publication date: 1-Jan-2022.

    https://doi.org/10.1155/2022/8653453

  • Meshram C, Ibrahim R, Obaidat M, Sadoun B, Meshram S and Tembhurne J. (2021). An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps. Soft Computing - A Fusion of Foundations, Methodologies and Applications. 25:14. (8905-8920). Online publication date: 1-Jul-2021.

    https://doi.org/10.1007/s00500-021-05781-7

  • Kumar V, Ray S, Dasgupta M and Khan M. (2021). A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography. Wireless Personal Communications: An International Journal. 118:4. (3045-3061). Online publication date: 1-Jun-2021.

    https://doi.org/10.1007/s11277-021-08168-x

  • Kumar M and Chand S. (2020). Escrow-Less Identity-Based Signature Scheme with Outsourced Protection in Cloud Computing. Wireless Personal Communications: An International Journal. 114:4. (3115-3136). Online publication date: 1-Oct-2020.

    https://doi.org/10.1007/s11277-020-07520-x

  • Kumar M and Chand S. (2019). ESKI-IBE. Multimedia Tools and Applications. 78:14. (19753-19786). Online publication date: 1-Jul-2019.

    https://doi.org/10.1007/s11042-019-7155-x

  • Ramesh Babu A, Gayathri N and Vasudeva Reddy P. (2019). Efficient and secure pairing-free certificateless strong key-insulated signature scheme. International Journal of Knowledge-based and Intelligent Engineering Systems. 23:3. (155-166). Online publication date: 1-Jan-2019.

    https://doi.org/10.3233/KES-190408

  • Li Q, Hsu C, Raymond Choo K, He D and Genge B. (2019). A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks. Security and Communication Networks. 2019. Online publication date: 1-Jan-2019.

    https://doi.org/10.1155/2019/7871067

  • Ibrahim M, Kumari S, Das A and Odelu V. (2018). Attribute-based authentication on the cloud for thin clients. The Journal of Supercomputing. 74:11. (5813-5845). Online publication date: 1-Nov-2018.

    https://doi.org/10.1007/s11227-016-1948-8

  • Mandal S, Mohanty S and Majhi B. (2018). Cryptanalysis and Enhancement of an Anonymous Self-Certified Key Exchange Protocol. Wireless Personal Communications: An International Journal. 99:2. (863-891). Online publication date: 1-Mar-2018.

    https://doi.org/10.1007/s11277-017-5156-5

  • (2018). An efficient certificateless aggregate signature without pairing. International Journal of Electronic Security and Digital Forensics. 10:2. (188-203). Online publication date: 1-Jan-2018.

    /doi/10.5555/3212157.3212162

  • (2018). Secure and efficient authentication scheme for access control in mobile pay-TV systems. International Journal of Electronic Security and Digital Forensics. 10:3. (292-310). Online publication date: 1-Jan-2018.

    https://doi.org/10.1504/IJESDF.2018.093014

  • Li X, Ibrahim M, Kumari S, Sangaiah A, Gupta V and Choo K. (2017). Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Computer Networks: The International Journal of Computer and Telecommunications Networking. 129:P2. (429-443). Online publication date: 24-Dec-2017.

    https://doi.org/10.1016/j.comnet.2017.03.013

  • Shen H, Shen J, Khan M and Lee J. (2017). Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things. Wireless Personal Communications: An International Journal. 96:4. (5253-5266). Online publication date: 1-Oct-2017.

    https://doi.org/10.1007/s11277-016-3739-1

  • Islam S and Biswas G. (2017). A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication. Journal of King Saud University - Computer and Information Sciences. 29:1. (63-73). Online publication date: 1-Jan-2017.

    https://doi.org/10.1016/j.jksuci.2015.01.004

  • Ni L, Chen G, Li J and Hao Y. (2016). Strongly secure identity-based authenticated key agreement protocols without bilinear pairings. Information Sciences: an International Journal. 367:C. (176-193). Online publication date: 1-Nov-2016.

    https://doi.org/10.1016/j.ins.2016.05.015

  • Ibrahim M, Kumari S, Das A, Wazid M and Odelu V. (2016). Secure anonymous mutual authentication for star two-tier wireless body area networks. Computer Methods and Programs in Biomedicine. 135:C. (37-50). Online publication date: 1-Oct-2016.

    https://doi.org/10.1016/j.cmpb.2016.07.022

  • Yang X, Huang X and Liu J. (2016). Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing. Future Generation Computer Systems. 62:C. (190-195). Online publication date: 1-Sep-2016.

    https://doi.org/10.1016/j.future.2015.09.028

  • Bala S, Sharma G and Verma A. (2016). PF-ID-2PAKA. Wireless Personal Communications: An International Journal. 87:3. (995-1012). Online publication date: 1-Apr-2016.

    https://doi.org/10.1007/s11277-015-2626-5

  • Qu Y, Deng L, Bao X and Huang H. (2016). An efficient certificateless multi-proxy signature scheme without pairing. International Journal of Electronic Security and Digital Forensics. 8:2. (148-163). Online publication date: 1-Mar-2016.

    https://doi.org/10.1504/IJESDF.2016.075588

  • Nimbhorkar S and Malik L. (2016). Comparative Analysis of Authenticated Key Agreement Protocols Based on Elliptic Curve Cryptography. Procedia Computer Science. 78:C. (824-830). Online publication date: 1-Mar-2016.

    https://doi.org/10.1016/j.procs.2016.02.065

  • Farash M, Islam S and Obaidat M. (2015). A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks. Concurrency and Computation: Practice & Experience. 27:17. (4897-4913). Online publication date: 10-Dec-2015.

    https://doi.org/10.1002/cpe.3477

  • Debiao He , Zeadally S, Baowen Xu and Xinyi Huang . (2015). An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Transactions on Information Forensics and Security. 10:12. (2681-2691). Online publication date: 1-Dec-2015.

    https://doi.org/10.1109/TIFS.2015.2473820

  • Sun H, Wen Q, Zhang H and Jin Z. (2015). A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption. Security and Communication Networks. 8:17. (3167-3179). Online publication date: 25-Nov-2015.

    https://doi.org/10.1002/sec.1241

  • Sarvabhatla M, Reddy M and Vorugunti C. A Robust Pairing-Free ID-Based Mutual Authentication Framework for Cloud Computing. Proceedings of the Sixth International Conference on Computer and Communication Technology 2015. (366-370).

    https://doi.org/10.1145/2818567.2818675

  • Islam S, Khan M and Al-Khouri A. (2015). Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Security and Communication Networks. 8:13. (2214-2231). Online publication date: 10-Sep-2015.

    https://doi.org/10.1002/sec.1165

  • Tu H, Kumar N, Kim J and Seo J. (2015). A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments. Multimedia Tools and Applications. 74:16. (6365-6377). Online publication date: 1-Aug-2015.

    https://doi.org/10.1007/s11042-015-2470-3

  • Hu Xiong and Zhiguang Qin . (2015). Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks. IEEE Transactions on Information Forensics and Security. 10:7. (1442-1455). Online publication date: 1-Jul-2015.

    https://doi.org/10.1109/TIFS.2015.2414399

  • Islam S and Biswas G. (2015). Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys. Wireless Personal Communications: An International Journal. 82:4. (2727-2750). Online publication date: 1-Jun-2015.

    https://doi.org/10.1007/s11277-015-2375-5

  • Cheng L, Wen Q, Jin Z, Zhang H and Zhou L. (2015). Cryptanalysis and improvement of a certificateless aggregate signature scheme. Information Sciences: an International Journal. 295:C. (337-346). Online publication date: 20-Feb-2015.

    https://doi.org/10.1016/j.ins.2014.09.065

  • Xiong H, Wu S, Li F and Qin Z. (2015). Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes. Wireless Personal Communications: An International Journal. 80:4. (1671-1685). Online publication date: 1-Feb-2015.

    https://doi.org/10.1007/s11277-014-2106-3

  • Debiao He and Zeadally S. (2015). Authentication protocol for an ambient assisted living system. IEEE Communications Magazine. 53:1. (71-77). Online publication date: 1-Jan-2015.

    https://doi.org/10.1109/MCOM.2015.7010518

  • Sahu R and Saraswat V. Secure and Efficient Scheme for Delegation of Signing Rights. Information and Communications Security. (258-273).

    https://doi.org/10.1007/978-3-319-21966-0_19

  • Alvarez Bermejo J, Lodroman M and Lopez-Ramos J. (2014). A decentralized protocol for mobile control access. The Journal of Supercomputing. 70:2. (709-720). Online publication date: 1-Nov-2014.

    https://doi.org/10.1007/s11227-014-1165-2

  • He D, Kumar N, Chilamkurti N and Lee J. (2014). Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol. Journal of Medical Systems. 38:10. (1-6). Online publication date: 1-Oct-2014.

    https://doi.org/10.1007/s10916-014-0116-z

  • Shi W, Kumar N, Gong P and Zhang Z. (2014). Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. Frontiers of Computer Science: Selected Publications from Chinese Universities. 8:4. (656-666). Online publication date: 1-Aug-2014.

    https://doi.org/10.1007/s11704-014-3245-0

  • Islam S and Biswas G. (2014). Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings. Journal of King Saud University - Computer and Information Sciences. 26:1. (89-97). Online publication date: 1-Jan-2014.

    https://doi.org/10.1016/j.jksuci.2013.05.001

  • Mishra D and Mukhopadhyay S. Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols. Proceedings of the 9th International Conference on Information Systems Security - Volume 8303. (247-254).

    https://doi.org/10.1007/978-3-642-45204-8_19

  • Sree Vivek S, Sharmila Deva Selvi S, Renganathan Venkatesan L and Pandu Rangan C. Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round. Proceedings of the 7th International Conference on Provable Security - Volume 8209. (38-58).

    https://doi.org/10.1007/978-3-642-41227-1_3

  • Xiong H, Chen Z and Li F. (2013). New identity-based three-party authenticated key agreement protocol with provable security. Journal of Network and Computer Applications. 36:2. (927-932). Online publication date: 1-Mar-2013.

    https://doi.org/10.1016/j.jnca.2012.10.001

  • Guo H, Xu C, Li Z, Yao Y and Mu Y. (2013). Efficient and dynamic key management for multiple identities in identity-based systems. Information Sciences: an International Journal. 221. (579-590). Online publication date: 1-Feb-2013.

    https://doi.org/10.1016/j.ins.2012.08.029

  • Mailloux N, Miri A and Nevins M. COMPASS. Proceedings of the 5th international conference on Foundations and Practice of Security. (95-114).

    https://doi.org/10.1007/978-3-642-37119-6_7

  • Islam S and Biswas G. Certificateless strong designated verifier multisignature scheme using bilinear pairings. Proceedings of the International Conference on Advances in Computing, Communications and Informatics. (540-546).

    https://doi.org/10.1145/2345396.2345485

  • Xiong H, Wu Q and Chen Z. Toward pairing-free certificateless authenticated key exchanges. Proceedings of the 14th international conference on Information security. (79-94).

    /doi/10.5555/2051002.2051010

  • Tiwari N and Padhye S. An ID-based proxy multi signature scheme without bilinear pairings. Proceedings of the First international conference on Security aspects in information technology. (83-92).

    /doi/10.5555/2062981.2062994