Conference Paper

Papers Presented/Published in International Conference Proceedings

 

1)     Pooja Tyagi and Saru Kumari; Security Flaws in Dhillon and Kalra's User Authentication Scheme for IoT. 2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) 2022 Nov 11-12 (pp. 1-4). IEEE. DOI: 10.1109/ICICT55121.2022.10064577 (INSPEC Accession Number: 22817445)(Date of Conference: 11-12 November 2022)(Date Added to IEEE Xplore: 20 March 2023)

2)     Yang Zhao, Zhaozhong Liu, Jingmin An, Guobin Zhu, Saru Kumari; A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios. In: Su, C., Gritzalis, D., Piuri, V. (eds) The 17th International Conference on Information Security Practice and Experience (ISPEC 2022), Lecture Notes in Computer Science (LNCS), Springer, Cham. (Online: 19 November 2022) Volume 13620, pp 624–639 https://doi.org/10.1007/978-3-031-21280-2_35 Print ISBN 978-3-031-21279-6 Online ISBN 978-3-031-21280-2 (Scopus)

3)     Rahul Kumar*, Mridul K. Gupta, SaruKuamri;ECC-based three-factor authentication scheme for multi-server environment.International Semantic Intelligence Conference (ISIC2021), MERI College,  Janakpuri, New Delhi, India, 25-27 Feb. 2021, Published in CEUR Workshop Proceedings (CEUR-WS.org) ISSN 1613-0073

4) Mridul Kumar Gupta, Rahul Kumar,Saru Kumari; Flaws and amendment in an ECC-based authentication scheme for SIP. 9th International Conference on System Modeling and Advancement in Research Trends, SMART 2020, pp.372. IEEE conference ID: 50582, Teerthankar Mahaveer University (TMU), Moradabad, India, 4-5 Dec. 2020, DOI: 10.1109/SMART50582.2020.9336790 ISSN (PRINT): 978-1-7281-8906-2; ISSN (CD-ROM): 978-1-7281-8905-5; ISSN (USB): 978-1-7281-8907-9; ISBN: 978-1-7281-8908-6 (Scopus)

5)     Marimuthu Karuppiah, Akshat Pradhan, Saru Kumari, Ruhul Amin, S. Rajkumar, Rahul Kumar;Security on “Secure remote login scheme with password and smart card update facilities.” 3rd International conference on Mathematics and Computing (ICMC, 2017), pp. 26-33, Jan. 17-21, 2017, Haldia Institute of Technology, Kolkata, India. DOI: 10.1007/978-981-10-4642-1 3 ISBN: 9811046417, 9789811046414

6)     Saru Kumari, Marimuthu Karuppiah;Security Problems of a “More Secure Remote User Authentication Scheme” International Conference on Advanced Communication Control and Computing Technologies (ICACCCT-2016),pp. 520 - 521, 25-27 May 2016 DOI: 10.1109/ICACCCT.2016.7831694Ramanathapuram, Tamilnadu, India.ISBN No.978-1-4673-9545-8

7)     XiongLi,Junguo Liao, Jiao Zhang, Saru Kumari, JianweiNiu,; A secure remote user mutual authentication scheme using smart cards. Computing, Communications & Applications Conference- (ComComAp 2014), DOI: 10.1109/ComComAp.2014.7017176 October, 20-22, pp. 89-92, 2014, Beijing, China. Electronic ISBN: 978-1-4799-4811-6; Print ISBN: 978-1-4799-4813-0;Print on Demand(PoD) ISBN: 978-1-4799-4810-9

8)     Muhammad Khurram Khan, Saru Kumari, Xiaomin Wang, Rahul Kumar; Security Issues of Chen et al.’s Dynamic ID-based Authentication Scheme. 12thIEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2014), DOI: 10.1109/DASC.2014.31 August 24-27, pp. 125-128, 2014, Dalian, China.Electronic ISBN: 978-1-4799-5079-9;CD-ROM ISBN: 978-1-4799-5078-2;Print on Demand(PoD) ISBN: 978-1-4799-5080-5

9)     Xiong Li, Muhammad Khurram Khan, Saru Kumari, Junguo Liao and Wei Liang; Cryptanalysis of a Robust Smart Card Authentication Scheme for Multi-server Architecture. IEEE International Symposium on Biometrics & Security Technologies (ISBAST’14), August26-27, DOI: 10.1109/ISBAST.2014.70131062014, pp. 120-123.Kuala Lumpur, Malaysia, Electronic ISBN: 978-1-4799-6444-4; CD-ROM ISBN: 978-1-4799-6443-7; Print on Demand(PoD) ISBN: 978-1-4799-6445-1

10) Saru Kumari, Muhammad Khurram Khan, Xiong Li, Rahul Kumar; Notes on “A Password-Based Remote User Authentication Scheme without Smart Card.” IEEE International Symposium on Biometrics & Security Technologies (ISBAST’14),DOI: 10.1109/ISBAST.2014.7013105, pp. 116-119, 26-27 August 2014. Kuala Lumpur, Malaysia. Electronic ISBN: 978-1-4799-6444-4; CD-ROM ISBN: 978-1-4799-6443-7; Print on Demand(PoD) ISBN: 978-1-4799-6445-1

11) Saru Kumari, Muhammad Khurram Khan, Fahad Bin Muhaya, R Kumar;Cryptanalysis of ‘A Robust Smart-Card-Based Remote User Password Authentication Scheme.’ IEEE International Symposium on Biometrics & Security Technologies (ISBAST’13), Chengdu, China, 2-5 July 2013.ISSN 9780769550107 076955010X 1467353132 9781467353137 9781467353137 (Attended the conference and presented the paper)

12) Muhammad Khurram Khan, Saru Kumari, Mridul Kumar Gupta;Cryptanalysis of Truong et al.’s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device. International conference on Brain Inspired Cognitive Systems (BICS 2013), Beijing, China,2013, Lecture Notes in Artificial Intelligence (LNAI), 9-11 June  2013. pp. 271-277, doi>10.1007/978-3-642-38786-9_31. ISBN: 978-3-642-38785-2 

13) Muhammad KhurramKhan,Saru Kumari, Mridul Kumar Gupta, Fahad T Bin Muhaya; Further Cryptanalysis of ‘A Remote Authentication Scheme Using Mobile Device.’ FourthInternational Conference on Computational Aspects of Social Networks (CASoN), in Sao Carlos Brazil, November 21-23,pp. 234 – 237, 2012.DOI: 10.1109/CASoN.2012.6412408, Electronic ISBN: 978-1-4673-4794-5; Print ISBN: 978-1-4673-4793-8; CD-ROM ISBN: 978-1-4673-4792-1

14) Saru Kumari, Muhammad KhurramKhan,  Mridul Kumar Gupta, Fahad T Bin Muhaya; Cryptanalysis of “an improved timestamp-based remote user authentication scheme. Proceedings of 2012 IEEE International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (ICQR2MSE),(Chengdu, China), 15-18 June 2012, pp. 1439 - 1442 Print ISBN: 978-1-4673-0786-4 DOI: 10.1109/ICQR2MSE.2012.6246494. Electronic ISBN: 978-1-4673-0788-8; Print ISBN: 978-1-4673-0786-4; CD-ROM ISBN: 978-1-4673-0787-1; Print on Demand(PoD) ISBN: 978-1-4673-0786-4

15) Manoj Kumar, Mridul Kumar Gupta, Saru Kumari; Cryptanalysis of Enhancements of a Password Authentication Scheme over Insecure Networks. Proceedings of 4th International Conference on Contemporary Computing (IC3) ,JIIT Noida, India, 8-10 August,  vol.168, pp. 524-532, 2011. ISBN 978-3-642-22605-2 (Attended the conference and presented the paper)

 

Paper in National Conference Proceedings

 

1)     Manoj Kumar, Mridul Kumar Gupta, Saru Kumari; An Enhanced User Friendly Remote Authentication Scheme with Smart Card. Proceedings of National Conference on Methods and Models in Computing (NCM2C 2007), (JNU, Delhi, India), Dec,13-14, 2007, ISBN: 8184242719, pp. 201-208, 2007.

 

National Conference Attended and paper presentation

 

1)        Anjali Harit, Saru Kumari; Use of Bilinear Pairings in Cryptography. National Seminar on “Recent Advances in Mathematics and its Computational Aspects”, Department of Mathematics, Shaheed Mangal Pandey Govt. Girls P.G. College, Madhavpuram, Meerut, 11-12 Nov, 2016.

2)        Kamini Chaudhary, Saru Kumari; Quantum Cryptography: A new approach for secure communications over insecure networks. National Seminar on “Recent Advances in Mathematics and its Computational Aspects”, Department of Mathematics, Shaheed Mangal Pandey Govt. Girls P.G. College, Madhavpuram, Meerut, 11-12 Nov, 2016.

3)        Km. Renuka, Saru Kumari, Prateet Kumar; Cryptanalysis of a remote user authentication scheme with smart cards. National Seminar on “Recent Advances in Mathematics and its Computational Aspects”, Department of Mathematics, Shaheed Mangal Pandey Govt. Girls P.G. College, Madhavpuram, Meerut,  11-12 Nov, 2016.

4)        Rahul Kumar, Saru Kumari, Rajendra Kumar; On the security of a hash function based mutual authentication protocol. National Seminar on “Recent Advances in Mathematics and its Computational Aspects” Department of Mathematics, Shaheed Mangal Pandey Govt. Girls P.G. College, Madhavpuram, Meerut, 11-12 Nov, 2016.

5)        Saru Kumari; Security weakness of “An efficient and complete remote user authentication scheme.” International Conference on Emerging Technologies in Science, Engineering & Management (ICETSEM 2016), Dr. K.N. Modi Institute of Engineering and Technolgy, Modinagar, 23-24 April 2016.

6) Saru Kumari; Cryptanalysis of “A secure and efficient mutual authentication protocol using hash function” International Conference on Emerging Technologies in Science, Engineering & Management (ICETSEM 2016), Dr. K.N. Modi Institute of Engineering and Technolgy, Modinagar, 23-24 April 2016.