Mohammad Sabzinejad Farash
Mohammad Sabzinejad Farash
Verified email at
Cited by
Cited by
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
MS Farash, M Turkanović, S Kumari, M Hölbl
Ad Hoc Networks 36, 152-176, 2016
An improved and provably secure privacy preserving authentication protocol for SIP
SA Chaudhry, H Naqvi, M Sher, MS Farash, MU Hassan
Peer-to-Peer Networking and Applications 10, 1-15, 2017
A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
SA Chaudhry, MS Farash, H Naqvi, M Sher
Electronic Commerce Research 16, 113-139, 2016
An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
MS Farash, MA Attari
Nonlinear Dynamics 77, 399-411, 2014
An enhanced privacy preserving remote user authentication scheme with provable security
SA Chaudhry, MS Farash, H Naqvi, S Kumari, MK Khan
Security and Communication Networks 8 (18), 3782-3795, 2015
An improved smart card based authentication scheme for session initiation protocol
S Kumari, SA Chaudhry, F Wu, X Li, MS Farash, MK Khan
Peer-to-Peer Networking and Applications 10, 92-105, 2017
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
MS Farash, SA Chaudhry, M Heydari, SM Sajad Sadough, S Kumari, ...
International Journal of Communication Systems 30 (4), e3019, 2017
Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
MS Farash
Peer-to-Peer Networking and Applications 9, 82-91, 2016
An improved anonymous authentication scheme for distributed mobile cloud computing services
SA Chaudhry, IL Kim, S Rho, MS Farash, T Shon
Cluster Computing 22, 1595-1609, 2019
A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks
MS Farash, MA Attari
The Journal of Supercomputing 69, 395-411, 2014
An enhanced authenticated key agreement for session initiation protocol
MS Farash, MA Attari
Information Technology and Control 42 (4), 333-342, 2013
A provably secure RFID authentication protocol based on elliptic curve for healthcare environments
MS Farash, O Nawaz, K Mahmood, SA Chaudhry, MK Khan
Journal of medical systems 40, 1-7, 2016
Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
MS Farash
The Journal of Supercomputing 70 (2), 987-1001, 2014
An improved and robust biometrics-based three factor authentication scheme for multiserver environments
SA Chaudhry, H Naqvi, MS Farash, T Shon, M Sher
The Journal of Supercomputing 74, 3504-3520, 2018
Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
MS Farash, MA Attari
Nonlinear Dynamics 76, 1203-1213, 2014
An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre
A Irshad, M Sher, SA Chaudhary, H Naqvi, MS Farash
The Journal of Supercomputing 72, 1623-1644, 2016
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments
SKH Islam, R Amin, GP Biswas, MS Farash, X Li, S Kumari
Journal of King Saud University-Computer and Information Sciences 29 (3 …, 2017
Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography
MS Farash, S Kumari, M Bakhtiari
Multimedia Tools and Applications 75, 4485-4504, 2016
An efficient client–client password-based authentication scheme with provable security
MS Farash, MA Attari
The Journal of Supercomputing 70, 1002-1022, 2014
PFLUA-DIoT: A pairing free lightweight and unlinkable user access control scheme for distributed IoT environments
SA Chaudhry, MS Farash, N Kumar, MH Alsharif
IEEE Systems Journal 16 (1), 309-316, 2020
The system can't perform the operation now. Try again later.
Articles 1–20