hari om - Academia.edu (original) (raw)

Papers by hari om

Research paper thumbnail of Remote Login Password Authentication Scheme Using Tangent Theorem on Circle

Springer eBooks, 2015

In this paper, we propose a remote password authentication scheme based on geometry. We use some ... more In this paper, we propose a remote password authentication scheme based on geometry. We use some simple tangent theorems of a circle, RSA encryption technique, and a strong one-way function to mutually authenticate the user and the server. It has a facility for a legal user to freely choose and change his password using his smart card. The security of this scheme depends on the tangent points located in a plane associated with the circle and the tangent line itself. In this scheme, the user anonymity is preserved and the communication cost is also reduced due to checking the correctness of the password before sending any authentication message.

Research paper thumbnail of Cryptanalysis and Extended Three-Factor Remote User Authentication Scheme in Multi-Server Environment

Arabian journal for science and engineering, Nov 1, 2016

Recently, Wen et al. have developed three-factor authentication protocol for multi-server environ... more Recently, Wen et al. have developed three-factor authentication protocol for multi-server environment, claiming it to be resistant to several kinds of attacks. In this paper, we review Wen et al.’s protocol and find that it does not fortify against many security vulnerabilities: (1) inaccurate password change phase, (2) failure to achieve forward secrecy, (3) improper authentication, (4) known session-specific temporary information vulnerability and (5) lack of smart card revocation and biometric update phase. To get rid of these security weaknesses, we present a safe and reliable three-factor authentication scheme usable in multi-server environment. The Burrows–Abadi–Needham logic shows that our scheme is accurate, and the formal and informal security verifications show that it can defend against various spiteful threats. Further, we simulate our scheme using the broadly known Automated Validation of Internet Security Protocols and Applications tool, which ensures that it is safe from the active and passive attacks and also prevent the replay and man-in-the-middle attacks. The performance evaluation shows that the presented protocol gives strong security as well as better complexity in the terms of communication cost, computation cost and estimated time.

Research paper thumbnail of A Privacy-Preserving Comparison Protocol

IEEE Transactions on Computers, Jun 1, 2023

Research paper thumbnail of Cryptanalysis and Security Enhancement of Three-Factor Remote User Authentication Scheme for Multi-Server Environment

International Journal of Business Data Communications and Networking, 2017

Research paper thumbnail of An Efficient Simulation of Quantum Secret Sharing

arXiv (Cornell University), Mar 20, 2021

In quantum cryptography, quantum secret sharing (QSS) is a fundamental primitive. QSS can be used... more In quantum cryptography, quantum secret sharing (QSS) is a fundamental primitive. QSS can be used to create complex and secure multiparty quantum protocols. Existing QSS protocols are either at the (n, n) threshold 2 level or at the (t, n) threshold d level with a trusted player, where n denotes the number of players and t denotes the threshold number of players. Here, we propose a secure d-level QSS protocol for sharing a secret with efficient simulation. This protocol is more secure, flexible, and practical as compared to the existing QSS protocols: (n, n) threshold 2-level and (t, n) threshold d-level with a trusted player. Further, it does not disclose any information about the secret to players. Its security analysis shows that the intercept-resend, intercept, entangle-measure, forgery, collision and collusion attacks are not possible in this protocol.

Research paper thumbnail of A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC

Computer Communications, Sep 1, 2017

With the rapid growth of the computer and the Internet technology, various types of services are ... more With the rapid growth of the computer and the Internet technology, various types of services are provided through the Internet such as e-banking, e-rail, e-commerce, online game, etc. Today, they have become an important part of our lives and make life very convenient. However, most of these applications/services operate over an insecure channel therefore authentication is required before permitting the remote access of those services. In this paper, we propose a secure anonymous three-factor based remote user authentication scheme for multi-server environment using ECC. We show that the proposed scheme is accurate and provides mutual authentication and session key agreement securely on the basis of BAN logic. Its formal security analysis, using Random Oracle Model, shows that an attacker cannot retrieve the backbone parameters such as user identity, password, secret keys, and session key. Using informal security analysis, we prove that our scheme defends against various security pitfalls. Additionally, we compare our scheme with other surviving relevant schemes and the comparative results show that our scheme is efficient in terms of computation cost, communication cost, smart card storage cost and estimated time. Specially, the proposed scheme is not only secure against various security threats, but it also facilitates an accurate login phase, robust authentication phase and user friendly password change phase.

Research paper thumbnail of Secret Sharing Based Multiparty Quantum Computation for Multiplication

International Journal of Theoretical Physics, Jul 31, 2021

In secure multiparty quantum computation (SMQC), the multiplication is one of the fundamental ope... more In secure multiparty quantum computation (SMQC), the multiplication is one of the fundamental operations that can be used to assemble the complex quantum protocols. The existing protocols have the approach of either (n, n) threshold or (t, n) threshold, with high cost and low security. In this paper, we propose a secret sharing based quantum protocol for (t, n) threshold secure multiparty multiplication, where t out of n players can compute the multiplication efficiently with low cost. In this protocol, the multiparty quantum multiplication can be performed if the number of secrets are more than the number of players as the secrets are shared using the linear secret sharing. Further, the security analysis shows that it is more secure against the intercept, entangle-measure, collusion, collective, and coherent attacks as compared to the existing protocols.

Research paper thumbnail of RSA Based Two-factor Remote User Authentication Scheme with User Anonymity

Procedia Computer Science, 2015

Research paper thumbnail of An extended ECC-based anonymity-preserving 3-factor remote authentication scheme usable in TMIS

International Journal of Communication Systems, Mar 1, 2018

A telecare medicine information system (TMIS) helps in providing an efficient communication platf... more A telecare medicine information system (TMIS) helps in providing an efficient communication platform to patients from home to consult doctors at a clinical center. In TMIS, the patient's confidentiality, security, and mutual authentication are very crucial; so remote authentication plays a vital role for verifying the legitimacy of patients. Recently, Amin and Biswas have devised a remote authentication protocol for TMIS, claiming it to be secured from various malicious vulnerabilities. We examine this protocol and find that it is not able to withstand many attacks that include off-line and online password-guessing, identity-guessing, user impersonation, privileged insider, and known session key temporary information attacks. We propose a 3-factor-based authentication protocol for TMIS by overcoming these security shortcomings. We present its security verification in formal and informal ways, which assert its resistivity against various security threats. We use the Burrows-Abadi-Needham logic for validating it, and with the Automated Validation of Internet Security Protocols and Applications tool, it is simulated. Further, the performance evaluation and the security functionalities justify high degree of security with efficient complexity.

Research paper thumbnail of A Secure and Privacy Preserving Remote User Authentication Protocol for Internet of Things Environment

Communications in computer and information science, 2017

In remote patient monitoring the wireless medical sensor networks WMSNs play a crucial role. In W... more In remote patient monitoring the wireless medical sensor networks WMSNs play a crucial role. In WMSNs, the sensor nodes are deployed in patient’s body for collecting physiological data. The patient’s physiological data are highly sensitive and important. Any malicious modification in physiological data will make wrong diagnoses and harm the patient health. Therefore, privacy, data security, and user authentication are extremely important for accessing patient’s real-time data over an insecure channel. In this regard, we design a secure and robust three-factor remote user authentication and key agreement scheme for remote patient monitoring. We simulate our protocol using AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, which asserts that the protocol is secure from the replay and man-in-the-middle attacks. The informal security verification proves that the suggested protocol is secure from various security threats. Performance comparison shows that the proposed scheme is efficient in terms of computation cost and communication cost.

Research paper thumbnail of An Efficient Two-Factor Remote User Authentication and Session Key Agreement Scheme Using Rabin Cryptosystem

Arabian journal for science and engineering, Jul 21, 2017

In this paper, we present a safe and reliable remote user authentication and session key agreemen... more In this paper, we present a safe and reliable remote user authentication and session key agreement scheme using the Rabin cryptosystem. The Rabin cryptosystem relies on prime integer factorization, which provides high security. Our scheme is validated using the Burrows–Abadi–Needham logic, which proved that it facilitates mutual authentication and session key agreement securely. The informal security analysis shows that the proposed scheme is secured against various malicious attacks. We simulate our scheme using the well-known Automated Validation of Internet Security Protocols and Applications tool, which confirms that the proposed scheme can defend from the passive and active attacks and also prevents the man-in-the-middle and replay attacks. Further, the performance evaluation shows that our scheme provides robustness against various security attacks as well as efficient in the terms of smart card storage cost, estimated execution time, communication cost and computation cost.

Research paper thumbnail of Cryptanalysis and improvement of a biometric-based remote user authentication protocol usable in a multiserver environment

Transactions on Emerging Telecommunications Technologies, May 25, 2017

Research paper thumbnail of Secret Sharing Based Multiparty Quantum Computation for Multiplication

International Journal of Theoretical Physics, 2021

In secure multiparty quantum computation (SMQC), the multiplication is one of the fundamental ope... more In secure multiparty quantum computation (SMQC), the multiplication is one of the fundamental operations that can be used to assemble the complex quantum protocols. The existing protocols have the approach of either (n, n) threshold or (t, n) threshold, with high cost and low security. In this paper, we propose a secret sharing based quantum protocol for (t, n) threshold secure multiparty multiplication, where t out of n players can compute the multiplication efficiently with low cost. In this protocol, the multiparty quantum multiplication can be performed if the number of secrets are more than the number of players as the secrets are shared using the linear secret sharing. Further, the security analysis shows that it is more secure against the intercept, entangle-measure, collusion, collective, and coherent attacks as compared to the existing protocols.

Research paper thumbnail of An extended ECC-based anonymity-preserving 3-factor remote authentication scheme usable in TMIS

International Journal of Communication Systems, 2018

A telecare medicine information system (TMIS) helps in providing an efficient communication platf... more A telecare medicine information system (TMIS) helps in providing an efficient communication platform to patients from home to consult doctors at a clinical center. In TMIS, the patient's confidentiality, security, and mutual authentication are very crucial; so remote authentication plays a vital role for verifying the legitimacy of patients. Recently, Amin and Biswas have devised a remote authentication protocol for TMIS, claiming it to be secured from various malicious vulnerabilities. We examine this protocol and find that it is not able to withstand many attacks that include off-line and online password-guessing, identity-guessing, user impersonation, privileged insider, and known session key temporary information attacks. We propose a 3-factor-based authentication protocol for TMIS by overcoming these security shortcomings. We present its security verification in formal and informal ways, which assert its resistivity against various security threats. We use the Burrows-Abadi-Needham logic for validating it, and with the Automated Validation of Internet Security Protocols and Applications tool, it is simulated. Further, the performance evaluation and the security functionalities justify high degree of security with efficient complexity.

Research paper thumbnail of A novel approach for text summarization using optimal combination of sentence scoring methods

Sādhanā, 2019

In this paper, a novel multi-document summarization scheme based on metaheuristic optimization is... more In this paper, a novel multi-document summarization scheme based on metaheuristic optimization is introduced that generates a summary by extracting salient and relevant sentences from a collection of documents. The proposed work generates optimal combinations of sentence scoring methods and their respective optimal weights to extract the sentences with the help of a metaheuristic approach known as teaching-learning-based optimization. In addition, the proposed scheme is compared to two summarization methods that use different metaheuristic approaches. The experimental results show the efficacy of the proposed summarization scheme.

Research paper thumbnail of A secure two-factor mutual authentication and session key agreement protocol using Elliptic curve cryptography

2015 IEEE International Conference on Computer Graphics, Vision and Information Security (CGVIS), 2015

In this paper, we propose a secure two-factor remote user authentication protocol using Elliptic ... more In this paper, we propose a secure two-factor remote user authentication protocol using Elliptic curve cryptography. The proposed protocol provides the mutual authentication of participants, session key agreement and user anonymity. The security of our proposed protocol is based on one way hash function and elliptic curve cryptosystem and it is secure against all relevant security attacks. Compared with other relevant protocol, the security analysis and performance evaluation show that our proposed protocol can provide high level of security with less communication and computation cost. In addition, the BAN logic is applied to demonstrate the validity of the proposed protocol.

Research paper thumbnail of Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines

Research paper thumbnail of A 3-D Geometry based Remote Login 2-Way Authentication Scheme using Smart Card

International Journal of Computer Network and Information Security, 2015

Research paper thumbnail of Prediction of Protein Tertiary Structure Using Cross Validation Technique

Owing to the strict relationship between protein structure and their functions, the 3D structure ... more Owing to the strict relationship between protein structure and their functions, the 3D structure prediction and classification of protein sequences has become one of the most challenging tasks in recent years. Despite of all the recent advancement in the field of molecular biology, the structural and behavioural nature of most of the protein and DNA sequences is still intractable. Notwithstanding with the large and new verities of new techniques which are proposed in recent years, sequence alignment and structure prediction is still an open problem. Therefore, in this paper we present a novel approach based on cross validation technique to predict the tertiary protein structure. The results so obtained are based on gravitational search methodology and were evaluated with reference to other existing methods for structure prediction and classification over structural benchmark datasets. The results which we gained after the experimental analysis, clearly demonstrates the robustness of...

Research paper thumbnail of Seamless channel transition using bespoke broadcasting scheme for video-on-demand service

IEEE Transactions on Consumer Electronics, Nov 1, 2005

Abstract — The video oriented applications require considerably large amount of bandwidth. The ba... more Abstract — The video oriented applications require considerably large amount of bandwidth. The bandwidth assigned to a video is very much dependent on its popularity. For popular videos, the bandwidth requirement is large. The popularity of a video is not static; it ...

Research paper thumbnail of Remote Login Password Authentication Scheme Using Tangent Theorem on Circle

Springer eBooks, 2015

In this paper, we propose a remote password authentication scheme based on geometry. We use some ... more In this paper, we propose a remote password authentication scheme based on geometry. We use some simple tangent theorems of a circle, RSA encryption technique, and a strong one-way function to mutually authenticate the user and the server. It has a facility for a legal user to freely choose and change his password using his smart card. The security of this scheme depends on the tangent points located in a plane associated with the circle and the tangent line itself. In this scheme, the user anonymity is preserved and the communication cost is also reduced due to checking the correctness of the password before sending any authentication message.

Research paper thumbnail of Cryptanalysis and Extended Three-Factor Remote User Authentication Scheme in Multi-Server Environment

Arabian journal for science and engineering, Nov 1, 2016

Recently, Wen et al. have developed three-factor authentication protocol for multi-server environ... more Recently, Wen et al. have developed three-factor authentication protocol for multi-server environment, claiming it to be resistant to several kinds of attacks. In this paper, we review Wen et al.’s protocol and find that it does not fortify against many security vulnerabilities: (1) inaccurate password change phase, (2) failure to achieve forward secrecy, (3) improper authentication, (4) known session-specific temporary information vulnerability and (5) lack of smart card revocation and biometric update phase. To get rid of these security weaknesses, we present a safe and reliable three-factor authentication scheme usable in multi-server environment. The Burrows–Abadi–Needham logic shows that our scheme is accurate, and the formal and informal security verifications show that it can defend against various spiteful threats. Further, we simulate our scheme using the broadly known Automated Validation of Internet Security Protocols and Applications tool, which ensures that it is safe from the active and passive attacks and also prevent the replay and man-in-the-middle attacks. The performance evaluation shows that the presented protocol gives strong security as well as better complexity in the terms of communication cost, computation cost and estimated time.

Research paper thumbnail of A Privacy-Preserving Comparison Protocol

IEEE Transactions on Computers, Jun 1, 2023

Research paper thumbnail of Cryptanalysis and Security Enhancement of Three-Factor Remote User Authentication Scheme for Multi-Server Environment

International Journal of Business Data Communications and Networking, 2017

Research paper thumbnail of An Efficient Simulation of Quantum Secret Sharing

arXiv (Cornell University), Mar 20, 2021

In quantum cryptography, quantum secret sharing (QSS) is a fundamental primitive. QSS can be used... more In quantum cryptography, quantum secret sharing (QSS) is a fundamental primitive. QSS can be used to create complex and secure multiparty quantum protocols. Existing QSS protocols are either at the (n, n) threshold 2 level or at the (t, n) threshold d level with a trusted player, where n denotes the number of players and t denotes the threshold number of players. Here, we propose a secure d-level QSS protocol for sharing a secret with efficient simulation. This protocol is more secure, flexible, and practical as compared to the existing QSS protocols: (n, n) threshold 2-level and (t, n) threshold d-level with a trusted player. Further, it does not disclose any information about the secret to players. Its security analysis shows that the intercept-resend, intercept, entangle-measure, forgery, collision and collusion attacks are not possible in this protocol.

Research paper thumbnail of A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC

Computer Communications, Sep 1, 2017

With the rapid growth of the computer and the Internet technology, various types of services are ... more With the rapid growth of the computer and the Internet technology, various types of services are provided through the Internet such as e-banking, e-rail, e-commerce, online game, etc. Today, they have become an important part of our lives and make life very convenient. However, most of these applications/services operate over an insecure channel therefore authentication is required before permitting the remote access of those services. In this paper, we propose a secure anonymous three-factor based remote user authentication scheme for multi-server environment using ECC. We show that the proposed scheme is accurate and provides mutual authentication and session key agreement securely on the basis of BAN logic. Its formal security analysis, using Random Oracle Model, shows that an attacker cannot retrieve the backbone parameters such as user identity, password, secret keys, and session key. Using informal security analysis, we prove that our scheme defends against various security pitfalls. Additionally, we compare our scheme with other surviving relevant schemes and the comparative results show that our scheme is efficient in terms of computation cost, communication cost, smart card storage cost and estimated time. Specially, the proposed scheme is not only secure against various security threats, but it also facilitates an accurate login phase, robust authentication phase and user friendly password change phase.

Research paper thumbnail of Secret Sharing Based Multiparty Quantum Computation for Multiplication

International Journal of Theoretical Physics, Jul 31, 2021

In secure multiparty quantum computation (SMQC), the multiplication is one of the fundamental ope... more In secure multiparty quantum computation (SMQC), the multiplication is one of the fundamental operations that can be used to assemble the complex quantum protocols. The existing protocols have the approach of either (n, n) threshold or (t, n) threshold, with high cost and low security. In this paper, we propose a secret sharing based quantum protocol for (t, n) threshold secure multiparty multiplication, where t out of n players can compute the multiplication efficiently with low cost. In this protocol, the multiparty quantum multiplication can be performed if the number of secrets are more than the number of players as the secrets are shared using the linear secret sharing. Further, the security analysis shows that it is more secure against the intercept, entangle-measure, collusion, collective, and coherent attacks as compared to the existing protocols.

Research paper thumbnail of RSA Based Two-factor Remote User Authentication Scheme with User Anonymity

Procedia Computer Science, 2015

Research paper thumbnail of An extended ECC-based anonymity-preserving 3-factor remote authentication scheme usable in TMIS

International Journal of Communication Systems, Mar 1, 2018

A telecare medicine information system (TMIS) helps in providing an efficient communication platf... more A telecare medicine information system (TMIS) helps in providing an efficient communication platform to patients from home to consult doctors at a clinical center. In TMIS, the patient's confidentiality, security, and mutual authentication are very crucial; so remote authentication plays a vital role for verifying the legitimacy of patients. Recently, Amin and Biswas have devised a remote authentication protocol for TMIS, claiming it to be secured from various malicious vulnerabilities. We examine this protocol and find that it is not able to withstand many attacks that include off-line and online password-guessing, identity-guessing, user impersonation, privileged insider, and known session key temporary information attacks. We propose a 3-factor-based authentication protocol for TMIS by overcoming these security shortcomings. We present its security verification in formal and informal ways, which assert its resistivity against various security threats. We use the Burrows-Abadi-Needham logic for validating it, and with the Automated Validation of Internet Security Protocols and Applications tool, it is simulated. Further, the performance evaluation and the security functionalities justify high degree of security with efficient complexity.

Research paper thumbnail of A Secure and Privacy Preserving Remote User Authentication Protocol for Internet of Things Environment

Communications in computer and information science, 2017

In remote patient monitoring the wireless medical sensor networks WMSNs play a crucial role. In W... more In remote patient monitoring the wireless medical sensor networks WMSNs play a crucial role. In WMSNs, the sensor nodes are deployed in patient’s body for collecting physiological data. The patient’s physiological data are highly sensitive and important. Any malicious modification in physiological data will make wrong diagnoses and harm the patient health. Therefore, privacy, data security, and user authentication are extremely important for accessing patient’s real-time data over an insecure channel. In this regard, we design a secure and robust three-factor remote user authentication and key agreement scheme for remote patient monitoring. We simulate our protocol using AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, which asserts that the protocol is secure from the replay and man-in-the-middle attacks. The informal security verification proves that the suggested protocol is secure from various security threats. Performance comparison shows that the proposed scheme is efficient in terms of computation cost and communication cost.

Research paper thumbnail of An Efficient Two-Factor Remote User Authentication and Session Key Agreement Scheme Using Rabin Cryptosystem

Arabian journal for science and engineering, Jul 21, 2017

In this paper, we present a safe and reliable remote user authentication and session key agreemen... more In this paper, we present a safe and reliable remote user authentication and session key agreement scheme using the Rabin cryptosystem. The Rabin cryptosystem relies on prime integer factorization, which provides high security. Our scheme is validated using the Burrows–Abadi–Needham logic, which proved that it facilitates mutual authentication and session key agreement securely. The informal security analysis shows that the proposed scheme is secured against various malicious attacks. We simulate our scheme using the well-known Automated Validation of Internet Security Protocols and Applications tool, which confirms that the proposed scheme can defend from the passive and active attacks and also prevents the man-in-the-middle and replay attacks. Further, the performance evaluation shows that our scheme provides robustness against various security attacks as well as efficient in the terms of smart card storage cost, estimated execution time, communication cost and computation cost.

Research paper thumbnail of Cryptanalysis and improvement of a biometric-based remote user authentication protocol usable in a multiserver environment

Transactions on Emerging Telecommunications Technologies, May 25, 2017

Research paper thumbnail of Secret Sharing Based Multiparty Quantum Computation for Multiplication

International Journal of Theoretical Physics, 2021

In secure multiparty quantum computation (SMQC), the multiplication is one of the fundamental ope... more In secure multiparty quantum computation (SMQC), the multiplication is one of the fundamental operations that can be used to assemble the complex quantum protocols. The existing protocols have the approach of either (n, n) threshold or (t, n) threshold, with high cost and low security. In this paper, we propose a secret sharing based quantum protocol for (t, n) threshold secure multiparty multiplication, where t out of n players can compute the multiplication efficiently with low cost. In this protocol, the multiparty quantum multiplication can be performed if the number of secrets are more than the number of players as the secrets are shared using the linear secret sharing. Further, the security analysis shows that it is more secure against the intercept, entangle-measure, collusion, collective, and coherent attacks as compared to the existing protocols.

Research paper thumbnail of An extended ECC-based anonymity-preserving 3-factor remote authentication scheme usable in TMIS

International Journal of Communication Systems, 2018

A telecare medicine information system (TMIS) helps in providing an efficient communication platf... more A telecare medicine information system (TMIS) helps in providing an efficient communication platform to patients from home to consult doctors at a clinical center. In TMIS, the patient's confidentiality, security, and mutual authentication are very crucial; so remote authentication plays a vital role for verifying the legitimacy of patients. Recently, Amin and Biswas have devised a remote authentication protocol for TMIS, claiming it to be secured from various malicious vulnerabilities. We examine this protocol and find that it is not able to withstand many attacks that include off-line and online password-guessing, identity-guessing, user impersonation, privileged insider, and known session key temporary information attacks. We propose a 3-factor-based authentication protocol for TMIS by overcoming these security shortcomings. We present its security verification in formal and informal ways, which assert its resistivity against various security threats. We use the Burrows-Abadi-Needham logic for validating it, and with the Automated Validation of Internet Security Protocols and Applications tool, it is simulated. Further, the performance evaluation and the security functionalities justify high degree of security with efficient complexity.

Research paper thumbnail of A novel approach for text summarization using optimal combination of sentence scoring methods

Sādhanā, 2019

In this paper, a novel multi-document summarization scheme based on metaheuristic optimization is... more In this paper, a novel multi-document summarization scheme based on metaheuristic optimization is introduced that generates a summary by extracting salient and relevant sentences from a collection of documents. The proposed work generates optimal combinations of sentence scoring methods and their respective optimal weights to extract the sentences with the help of a metaheuristic approach known as teaching-learning-based optimization. In addition, the proposed scheme is compared to two summarization methods that use different metaheuristic approaches. The experimental results show the efficacy of the proposed summarization scheme.

Research paper thumbnail of A secure two-factor mutual authentication and session key agreement protocol using Elliptic curve cryptography

2015 IEEE International Conference on Computer Graphics, Vision and Information Security (CGVIS), 2015

In this paper, we propose a secure two-factor remote user authentication protocol using Elliptic ... more In this paper, we propose a secure two-factor remote user authentication protocol using Elliptic curve cryptography. The proposed protocol provides the mutual authentication of participants, session key agreement and user anonymity. The security of our proposed protocol is based on one way hash function and elliptic curve cryptosystem and it is secure against all relevant security attacks. Compared with other relevant protocol, the security analysis and performance evaluation show that our proposed protocol can provide high level of security with less communication and computation cost. In addition, the BAN logic is applied to demonstrate the validity of the proposed protocol.

Research paper thumbnail of Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines

Research paper thumbnail of A 3-D Geometry based Remote Login 2-Way Authentication Scheme using Smart Card

International Journal of Computer Network and Information Security, 2015

Research paper thumbnail of Prediction of Protein Tertiary Structure Using Cross Validation Technique

Owing to the strict relationship between protein structure and their functions, the 3D structure ... more Owing to the strict relationship between protein structure and their functions, the 3D structure prediction and classification of protein sequences has become one of the most challenging tasks in recent years. Despite of all the recent advancement in the field of molecular biology, the structural and behavioural nature of most of the protein and DNA sequences is still intractable. Notwithstanding with the large and new verities of new techniques which are proposed in recent years, sequence alignment and structure prediction is still an open problem. Therefore, in this paper we present a novel approach based on cross validation technique to predict the tertiary protein structure. The results so obtained are based on gravitational search methodology and were evaluated with reference to other existing methods for structure prediction and classification over structural benchmark datasets. The results which we gained after the experimental analysis, clearly demonstrates the robustness of...

Research paper thumbnail of Seamless channel transition using bespoke broadcasting scheme for video-on-demand service

IEEE Transactions on Consumer Electronics, Nov 1, 2005

Abstract — The video oriented applications require considerably large amount of bandwidth. The ba... more Abstract — The video oriented applications require considerably large amount of bandwidth. The bandwidth assigned to a video is very much dependent on its popularity. For popular videos, the bandwidth requirement is large. The popularity of a video is not static; it ...