[J1] Mohd Shariq and Karan Singh “A novel Vector-Space-based Lightweight Privacy-Preserving RFID Authentication Protocol for IoT Environment” The Journal of Supercomputing, pp. 1-31, 2021.
https://doi.org/10.1007/s11227-020-03550-1 , SCI, IF: 3.3
[J2] Mohd Shariq, Karan Singh, Pramod Kumar Maurya, Ali Ahmadian, and Muhammad Rezal Kamel Ariffin “URASP: An ultralightweight RFID Authentication Scheme using Permutation operation” Peerto-Peer Networking and Applications, pp. 1-21, 2021.
https://doi.org/10.1007/s12083-021-01192-5 , SCI, IF: 4.2
[J3] Mohd Shariq, Karan Singh, and Ali Ahmadian “SR2AP-DSC: A Secure and Reliable RFID Authentication Protocol using Digital Schnorr Cryptosystem for IoT-enabled Healthcare in COVID-19 Scenario” Sustainable Cities and Society, Elsevier.
https://doi.org/10.1016/j.scs.2021.103354, SCI, IF: 11.7
[J4] Mohd Shariq and Karan Singh “A Vector-Space-based Lightweight RFID Authentication Protocol” International Journal of Information and Technology, pp. 1-10, 2021. (Springer-Scopus)
https://doi.org/10.1007/s41870-021-00709-8
[J5] Mohd Shariq, Karan Singh, Mauro Conti, Chhagan Lal, Neeraj Kumar, and Shehzad Ashraf Chaudhry “Anonymous and Reliable ultralightweight RFID-enabled Authentication Scheme for IoT Systems in Cloud Computing” IEEE Transactions on Dependable and Secure Computing, IEEE explore.
(Submitted)
[J6] Mohd Shariq, Karan Singh, Pramod Kumar Maurya, Ali Ahmadian, and David Taniar “AnonSURP: An Anonymous and Secure ultralightweight RFID Protocol for Deployment on the Internet of Vehicles Systems” The Journal of Supercomputing.
https://doi.org/10.1007/s11227-021-04232-2, SCI, IF: 3.3
[J7] Mohd Shariq, Karan Singh, Chhagan Lal, Mauro Conti, and Tayyab Khan “ESRAS: An efficient and Secure ultralightweight RFID Authentication Scheme using Rank operation for Low-cost tags in IoT Environment” Computer Networks, Elsevier.
https://doi.org/10.1016/j.coment.2022.109360, SCI, IF: 5.6
[J8] Mohd Shariq and Karan Singh “A Secure and Lightweight RFID-enabled Protocol for IoT Healthcare Environment: A Vector Space based Approach” Wireless Personal Communication, Springer.
https://doi.org/10.1007/s11277-022-09928-z, SCI, IF: 2.2
[J9] Anand Kumar, Karan Singh, Mohd Shariq, Chhagan Lal, Mauri Conti, Ruhul Amin, and Shehzad Ashraf Chaudhry “An Efficient and Reliable ultralightweight RFID Authentication Scheme for Healthcare Systems” Computer Communications, Elsevier.
https://doi.org/10.1016/j.comcom.2023.04.013, SCI, IF: 6
[J10] Tayyab Khan, Karan Singh, Mohd Shariq, Ali Ahmadian, Soheil Salahshour, and Ali Ahmadian “An Efficient Trust-based Decision-Making Approach for WSNs: Machine Learning Oriented Approach” Computer Communications, Elsevier.
https://doi.org/10.1016/j.comcom.2023.06.014, SCI, IF: 6
[J11] Tayyab Khan, Karan Singh, KM Khusboo, Khaleel Ahmad, Mohd Shariq “DTMS: A Dual Trustbased Multi-level Sybil Attack Detection Approach in WSNs” Sustainable Computing: Informatics and Systems.
(Submitted)
[J12] Mohd Shariq, Sanjeev Dwivedi, Mohammad Abdussami, Karan Singh, Ruhul Amin, Mauro Conti, and Chhagan Lal “An RFID-based Lightweight and Provably Secure Authentication Protocol for Unmanned Aerial Vehicle Systems” IEEE Transactions on Dependable and Secure Computing, IEEE explore.
(Submitted)
[J13] Mohd Shariq and Karan Singh, “A 2D-LASM based Privacy-Preserving Image Encryption Scheme for Secure Communications,” Multimedia Tools and Applications, Springer.
(Submitted)
[C1] Mohd Shariq and Karan Singh “An RFID-based Authentication Protocol for IoT Healthcare Environment”, Presented in Grenze conference.
[C2] Mohd Shariq and Karan Singh “Probabilistic Image Encryption based Secure Surveillance Framework for IoT Environment”, Presented in 2 nd International Conference on Networks and Cryptology (NetCrypt), JNU, New Delhi, India.