scispace - formally typeset
M

Mohammad Wazid

Researcher at Graphic Era University

Publications -  111
Citations -  5990

Mohammad Wazid is an academic researcher from Graphic Era University. The author has contributed to research in topics: Authentication & The Internet. The author has an hindex of 31, co-authored 86 publications receiving 3619 citations. Previous affiliations of Mohammad Wazid include Manipal University & International Institute of Information Technology.

Papers
More filters
Proceedings ArticleDOI

Big data: Issues, challenges, tools and Good practices

TL;DR: The various challenges and issues in adapting and accepting Big data technology, its tools (Hadoop) are discussed in detail along with the problems Hadoop is facing.
Journal ArticleDOI

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications

TL;DR: A new signature-based authenticated key establishment scheme for the IoT environment that provides more functionality features, and its computational and communication costs are also comparable with other existing approaches.
Journal ArticleDOI

Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks

TL;DR: The design of a new secure lightweight three-factor remote user authentication scheme for HIoTNs, called the user authenticated key management protocol (UAKMP), which is comparable in computation and communication costs as compared to other existing schemes.
Journal ArticleDOI

Provably Secure Authenticated Key Agreement Scheme for Smart Grid

TL;DR: This paper analyzes the security of a recent relevant work in smart grid and proposes a new efficient provably secure authenticated key agreement scheme for smart grid that achieves the well-known security functionalities including smart meter credentials’ privacy and SK-security under the CK-adversary model.
Journal ArticleDOI

Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment

TL;DR: A new secure remote user authentication scheme for a smart home environment that is efficient for resource-constrained smart devices with limited resources as it uses only one-way hash functions, bitwise XOR operations and symmetric encryptions/decryptions.