D-Index & Metrics Best Publications
Research.com 2022 Rising Star of Science Award Badge

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 45 Citations 6,937 207 World Ranking 3649 National Ranking 29
Rising Stars D-index 45 Citations 6,942 238 World Ranking 401 National Ranking 10

Research.com Recognitions

Awards & Achievements

2022 - Research.com Rising Star of Science Award

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Computer security
  • Artificial intelligence

Computer security, Authentication, Computer network, Password and Smart card are his primary areas of study. His study in Computer security concentrates on Mutual authentication, Session key, Anonymity, Key and Random oracle. His work is dedicated to discovering how Authentication, Biometrics are connected with Security analysis and Heterogeneous network and other disciplines.

His work on Wireless sensor network and Node as part of general Computer network study is frequently linked to Internet security, therefore connecting diverse disciplines of science. He has included themes like Forward secrecy and Cryptanalysis in his Password study. Saru Kumari interconnects Password cracking, User authentication and Robustness in the investigation of issues within Smart card.

His most cited work include:

  • An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment (218 citations)
  • Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks (148 citations)
  • A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments (147 citations)

What are the main themes of his work throughout his whole career to date?

Saru Kumari spends much of his time researching Computer security, Computer network, Authentication, Password and Authentication protocol. His Computer security and Smart card, Anonymity, Mutual authentication, Key and Session key investigations all form part of his Computer security research activities. His work carried out in the field of Authentication brings together such families of science as Security analysis, Elliptic curve cryptography, Server and Protocol.

Saru Kumari combines subjects such as Forward secrecy and Challenge–response authentication with his study of Password. Saru Kumari has researched Authentication protocol in several fields, including Key-agreement protocol, Cryptographic protocol and Secure communication. His research integrates issues of Sensor node and Key distribution in wireless sensor networks in his study of Wireless sensor network.

He most often published in these fields:

  • Computer security (67.41%)
  • Computer network (42.41%)
  • Authentication (42.41%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (67.41%)
  • Computer network (42.41%)
  • Authentication (42.41%)

In recent papers he was focusing on the following fields of study:

Saru Kumari mainly focuses on Computer security, Computer network, Authentication, Protocol and Authentication protocol. His Computer security study is mostly concerned with Security analysis, Key, Anonymity, Blockchain and Random oracle. His work investigates the relationship between Computer network and topics such as Wireless ad hoc network that intersect with problems in Overhead.

His research in Authentication intersects with topics in Elliptic curve cryptography, Password and Server. Saru Kumari mostly deals with Password cracking in his studies of Password. His Authentication protocol study combines topics in areas such as Enhanced Data Rates for GSM Evolution, Client–server model, Key exchange and Biometrics.

Between 2019 and 2021, his most popular works were:

  • A secure authenticated and key exchange scheme for fog computing (34 citations)
  • PoRX: A reputation incentive scheme for blockchain consensus of IIoT (28 citations)
  • An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks (27 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Computer security
  • Cryptography

His primary areas of investigation include Computer network, Computer security, Authentication, Authentication protocol and Protocol. His studies deal with areas such as Security analysis and Wireless ad hoc network as well as Computer network. His Authentication study integrates concerns from other disciplines, such as Server and Heterogeneous network.

The concepts of his Authentication protocol study are interwoven with issues in Secure communication and Biometrics. His biological study spans a wide range of topics, including Password cracking, Vehicular communication systems, Key and Password authentication protocol. Saru Kumari focuses mostly in the field of Protocol, narrowing it down to topics relating to Blockchain and, in certain cases, Data security.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment

Mohammad Sabzinejad Farash;Muhamed Turkanović;Saru Kumari;Marko Hölbl.
ad hoc networks (2016)

306 Citations

A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things

Xiong Li;Jianwei Niu;Zakirul Alam Bhuiyan;Fan Wu.
IEEE Transactions on Industrial Informatics (2018)

176 Citations

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks

Xiong Li;Maged Hamada Ibrahim;Saru Kumari;Arun Kumar Sangaiah.
Computer Networks (2017)

151 Citations

User authentication schemes for wireless sensor networks

Saru Kumari;Muhammad Khurram Khan;Mohammed Atiquzzaman.
ad hoc networks (2015)

149 Citations

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

Xiong Li;Jianwei Niu;Saru Kumari;Fan Wu.
Journal of Network and Computer Applications (2018)

149 Citations

An elliptic curve cryptography based lightweight authentication scheme for smart grid communication

Khalid Mahmood;Shehzad Ashraf Chaudhry;Husnain Naqvi;Saru Kumari.
Future Generation Computer Systems (2018)

127 Citations

Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce

Dheerendra Mishra;Sourav Mukhopadhyay;Saru Kumari;Muhammad Khurram Khan.
Journal of Medical Systems (2014)

125 Citations

An improved remote user authentication scheme with key agreement

Saru Kumari;Muhammad Khurram Khan;Xiong Li.
Computers & Electrical Engineering (2014)

120 Citations

A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers

Saru Kumari;Marimuthu Karuppiah;Ashok Kumar Das;Xiong Li.
The Journal of Supercomputing (2018)

118 Citations

Design of a provably secure biometrics-based multi-cloud-server authentication scheme

Saru Kumari;Xiong Li;Xiong Li;Fan Wu;Ashok Kumar Das.
Future Generation Computer Systems (2017)

118 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Saru Kumari

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 73

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 58

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 39

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 33

Debiao He

Debiao He

Wuhan University

Publications: 33

Joel J. P. C. Rodrigues

Joel J. P. C. Rodrigues

Federal University of Piauí

Publications: 29

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 29

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 26

Mohammad S. Obaidat

Mohammad S. Obaidat

University of Jordan

Publications: 25

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 19

Athanasios V. Vasilakos

Athanasios V. Vasilakos

Luleå University of Technology

Publications: 17

Fadi Al-Turjman

Fadi Al-Turjman

Near East University

Publications: 16

Arun Kumar Sangaiah

Arun Kumar Sangaiah

Vellore Institute of Technology University

Publications: 14

Jin Wang

Jin Wang

Changsha University of Science and Technology

Publications: 10

Zakirul Alam Bhuiyan

Zakirul Alam Bhuiyan

Fordham University

Publications: 10

Lixiang Li

Lixiang Li

Beijing University of Posts and Telecommunications

Publications: 8

Trending Scientists

Lin Cai

Lin Cai

University of Victoria

Hynek Hermansky

Hynek Hermansky

Johns Hopkins University

Michael H. Riordan

Michael H. Riordan

Columbia University

Douglas J. Skinner

Douglas J. Skinner

University of Chicago

Emmanuel Bacry

Emmanuel Bacry

École Polytechnique

Scott Bair

Scott Bair

Georgia Institute of Technology

Said S.E.H. Elnashaie

Said S.E.H. Elnashaie

University of British Columbia

Jaime Kigel

Jaime Kigel

Hebrew University of Jerusalem

John D. York

John D. York

Vanderbilt University

Jean-Paul Behr

Jean-Paul Behr

Centre national de la recherche scientifique, CNRS

Richard J. Hamill

Richard J. Hamill

Baylor College of Medicine

Martin H. Schroth

Martin H. Schroth

ETH Zurich

Catrin Finkenauer

Catrin Finkenauer

Utrecht University

Arnaud Perrier

Arnaud Perrier

Geneva College

David A. Schwartz

David A. Schwartz

University of Colorado Denver

Raymond G. Carlberg

Raymond G. Carlberg

University of Toronto

Something went wrong. Please try again later.