Ashok Kumar Das

Summary

Publications

  1. ncbi request reprint An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function
    Ashok Kumar Das
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, 500 032, India
    J Med Syst 38:27. 2014
  2. doi request reprint An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system
    Ashok Kumar Das
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, 500 032, India
    J Med Syst 37:9969. 2013
  3. doi request reprint A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
    Ashok Kumar Das
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, 500 032, India
    J Med Syst 37:9948. 2013

Detail Information

Publications3

  1. ncbi request reprint An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function
    Ashok Kumar Das
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, 500 032, India
    J Med Syst 38:27. 2014
    ..Our scheme is also efficient as compared to Awasthi-Srivastava's scheme. ..
  2. doi request reprint An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system
    Ashok Kumar Das
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, 500 032, India
    J Med Syst 37:9969. 2013
    ....
  3. doi request reprint A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
    Ashok Kumar Das
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, 500 032, India
    J Med Syst 37:9948. 2013
    ..In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication...