Follow
Mohammad Sabzinejad Farash
Mohammad Sabzinejad Farash
Verified email at khu.ac.ir
Title
Cited by
Cited by
Year
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
MS Farash, M Turkanović, S Kumari, M Hölbl
Ad Hoc Networks 36, 152-176, 2016
5032016
An improved and provably secure privacy preserving authentication protocol for SIP
SA Chaudhry, H Naqvi, M Sher, MS Farash, MU Hassan
Peer-to-Peer Networking and Applications 10, 1-15, 2017
1272017
An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
MS Farash, MA Attari
Nonlinear Dynamics 77, 399-411, 2014
1222014
A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
SA Chaudhry, MS Farash, H Naqvi, M Sher
Electronic Commerce Research 16, 113-139, 2016
1212016
An enhanced privacy preserving remote user authentication scheme with provable security
SA Chaudhry, MS Farash, H Naqvi, S Kumari, MK Khan
Security and Communication Networks 8 (18), 3782-3795, 2015
982015
An improved smart card based authentication scheme for session initiation protocol
S Kumari, SA Chaudhry, F Wu, X Li, MS Farash, MK Khan
Peer-to-Peer Networking and Applications 10, 92-105, 2017
962017
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
MS Farash, SA Chaudhry, M Heydari, SM Sajad Sadough, S Kumari, ...
International Journal of Communication Systems 30 (4), e3019, 2017
952017
Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
MS Farash
Peer-to-Peer Networking and Applications 9, 82-91, 2016
802016
An improved anonymous authentication scheme for distributed mobile cloud computing services
SA Chaudhry, IL Kim, S Rho, MS Farash, T Shon
Cluster Computing 22, 1595-1609, 2019
672019
An enhanced authenticated key agreement for session initiation protocol
MS Farash, MA Attari
Information Technology and Control 42 (4), 333-342, 2013
672013
A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks
MS Farash, MA Attari
The Journal of Supercomputing 69, 395-411, 2014
662014
A provably secure RFID authentication protocol based on elliptic curve for healthcare environments
MS Farash, O Nawaz, K Mahmood, SA Chaudhry, MK Khan
Journal of medical systems 40, 1-7, 2016
622016
Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
MS Farash
The Journal of Supercomputing 70 (2), 987-1001, 2014
622014
An improved and robust biometrics-based three factor authentication scheme for multiserver environments
SA Chaudhry, H Naqvi, MS Farash, T Shon, M Sher
The Journal of Supercomputing 74, 3504-3520, 2018
582018
Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
MS Farash, MA Attari
Nonlinear Dynamics 76, 1203-1213, 2014
582014
An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre
A Irshad, M Sher, SA Chaudhary, H Naqvi, MS Farash
The Journal of Supercomputing 72, 1623-1644, 2016
532016
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments
SKH Islam, R Amin, GP Biswas, MS Farash, X Li, S Kumari
Journal of King Saud University-Computer and Information Sciences 29 (3 …, 2017
502017
Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography
MS Farash, S Kumari, M Bakhtiari
Multimedia Tools and Applications 75, 4485-4504, 2016
452016
An efficient client–client password-based authentication scheme with provable security
MS Farash, MA Attari
The Journal of Supercomputing 70, 1002-1022, 2014
422014
A Pairing-free ID-based Key Agreement Protocol with Different PKGs.
MS Farash, M Ahmadian-Attari
Int. J. Netw. Secur. 16 (2), 143-148, 2014
402014
The system can't perform the operation now. Try again later.
Articles 1–20