2022 - Research.com Rising Star of Science Award
Computer security, Authentication, Computer network, Password and Smart card are his primary areas of study. His study in Computer security concentrates on Mutual authentication, Session key, Anonymity, Key and Random oracle. His work is dedicated to discovering how Authentication, Biometrics are connected with Security analysis and Heterogeneous network and other disciplines.
His work on Wireless sensor network and Node as part of general Computer network study is frequently linked to Internet security, therefore connecting diverse disciplines of science. He has included themes like Forward secrecy and Cryptanalysis in his Password study. Saru Kumari interconnects Password cracking, User authentication and Robustness in the investigation of issues within Smart card.
Saru Kumari spends much of his time researching Computer security, Computer network, Authentication, Password and Authentication protocol. His Computer security and Smart card, Anonymity, Mutual authentication, Key and Session key investigations all form part of his Computer security research activities. His work carried out in the field of Authentication brings together such families of science as Security analysis, Elliptic curve cryptography, Server and Protocol.
Saru Kumari combines subjects such as Forward secrecy and Challenge–response authentication with his study of Password. Saru Kumari has researched Authentication protocol in several fields, including Key-agreement protocol, Cryptographic protocol and Secure communication. His research integrates issues of Sensor node and Key distribution in wireless sensor networks in his study of Wireless sensor network.
Saru Kumari mainly focuses on Computer security, Computer network, Authentication, Protocol and Authentication protocol. His Computer security study is mostly concerned with Security analysis, Key, Anonymity, Blockchain and Random oracle. His work investigates the relationship between Computer network and topics such as Wireless ad hoc network that intersect with problems in Overhead.
His research in Authentication intersects with topics in Elliptic curve cryptography, Password and Server. Saru Kumari mostly deals with Password cracking in his studies of Password. His Authentication protocol study combines topics in areas such as Enhanced Data Rates for GSM Evolution, Client–server model, Key exchange and Biometrics.
His primary areas of investigation include Computer network, Computer security, Authentication, Authentication protocol and Protocol. His studies deal with areas such as Security analysis and Wireless ad hoc network as well as Computer network. His Authentication study integrates concerns from other disciplines, such as Server and Heterogeneous network.
The concepts of his Authentication protocol study are interwoven with issues in Secure communication and Biometrics. His biological study spans a wide range of topics, including Password cracking, Vehicular communication systems, Key and Password authentication protocol. Saru Kumari focuses mostly in the field of Protocol, narrowing it down to topics relating to Blockchain and, in certain cases, Data security.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
Mohammad Sabzinejad Farash;Muhamed Turkanović;Saru Kumari;Marko Hölbl.
ad hoc networks (2016)
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
Xiong Li;Jianwei Niu;Zakirul Alam Bhuiyan;Fan Wu.
IEEE Transactions on Industrial Informatics (2018)
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
Xiong Li;Maged Hamada Ibrahim;Saru Kumari;Arun Kumar Sangaiah.
Computer Networks (2017)
User authentication schemes for wireless sensor networks
Saru Kumari;Muhammad Khurram Khan;Mohammed Atiquzzaman.
ad hoc networks (2015)
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
Xiong Li;Jianwei Niu;Saru Kumari;Fan Wu.
Journal of Network and Computer Applications (2018)
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
Khalid Mahmood;Shehzad Ashraf Chaudhry;Husnain Naqvi;Saru Kumari.
Future Generation Computer Systems (2018)
Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce
Dheerendra Mishra;Sourav Mukhopadhyay;Saru Kumari;Muhammad Khurram Khan.
Journal of Medical Systems (2014)
An improved remote user authentication scheme with key agreement
Saru Kumari;Muhammad Khurram Khan;Xiong Li.
Computers & Electrical Engineering (2014)
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
Saru Kumari;Marimuthu Karuppiah;Ashok Kumar Das;Xiong Li.
The Journal of Supercomputing (2018)
Design of a provably secure biometrics-based multi-cloud-server authentication scheme
Saru Kumari;Xiong Li;Xiong Li;Fan Wu;Ashok Kumar Das.
Future Generation Computer Systems (2017)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: