Papers Presented/Published in Scopus Index International Conference Proceedings
1) Liyang Wang, Saru Kumari, Tsu-Yang Wu; Security Analysis of Two Authentication and Key Agreement Protocols Based on Wireless Sensor Networks. Comments on “Two Authentication and Key Agreement Protocols in WSN Environments”. (Online:15 May 2023), pp-563-574, Advances in Smart Vehicular Technology, Transportation, Communication and Applications,Springer, Print ISBN: 978-981-99-0847-9, Online ISBN: 978-981-99-0848-6 , DOI:https://doi.org/10.1007/978-981-99-0848-6_45(Scopus)
2) Yiru Hao, Saru Kumari, Kuruva Lakshmanna, Chin-Ming Chen; Privileged insider attacks on two authentication schemes. (Online:15 May 2023), pp-515-524, Advances in Smart Vehicular Technology, Transportation, Communication and Applications, Springer, Print ISBN: 978-981-99-0847-9, Online ISBN: 978-981-99-0848-6, DOI: https://doi.org/10.1007/978-981-99-0848-6_41(Scopus)
3) Zhongqi Yang, Yihua Chen, Saru Kumari; TUDF-NeRF: Generalizable Neural Radiance Field via Truncated Unsigned Distance Field. (Online: 31 January 2024), 2023 Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC), IEEE, Print on Demand(PoD) ISBN: 978-1-6654-5704-0, Electronic ISBN: 978-1-6654-5703-3, DOI: 10.1109/IPEC57296.2023.00070(Scopus)
4) Haozhi Wu, Saru Kumari, Tsu-yang Wu; To Analyze Security Requirements of Two AKA Protocols in WBAN and VANET. (Online:15 May 2023), pp-491-500, Advances in Smart Vehicular Technology, Transportation, Communication and Applications,Springer, Print ISBN: 978-981-99-0847-9, Online ISBN: 978-981-99-0848-6, DOI: https://doi.org/10.1007/978-981-99-0848-6_39(Scopus)
5) Fangfang Kong, Saru Kumari, Tsu-Yang Wu; Comments on “Two Authentication and Key Agreement Protocols in WSN Environments”. (Online:15 May 2023), pp-551-561, Advances in Smart Vehicular Technology, Transportation, Communication and Applications,Springer, Hardcover ISBN: 978-981-99-0847-9, Softcover ISBN: 978-981-99-0850-9, eBook ISBN: 978-981-99-0848-6, Series ISSN: 2190-3018, Series E-ISSN: 2190-3026, DOI: https://doi.org/10.1007/978-981-99-0848-6 _44(Scopus)
6) Haonan Li, Shu-Chuan Chu, Saru Kumari, Tsu_yang Wu; Fick’s law algorithm with Gaussian mutation: Design and analysis. (Online:25 January 2024), Genetic and Evolutionary Computing, Springer, 6-8 October 2023, Kaohsiung, TaiwanVolume:II, ISSUE: , Print ISBN: 978-981-99-9411-3, Online ISBN: 978-981-99-9412-0, DOI: https://doi.org/10.1007/978-981-99-9412-0_47 (Conferrence)(Scopus)
7) Peiliang QIN, Rongjing HONG*, Saru KUMAR; Virtual Roots: Multiple View Dataset Designed by Unity 3D. (Online:June 2024), ), Image Processing, Electronics and Computers, Proceedings of the 5th Asia-Pacific Conference [IPEC2024], Dalian, China, 12-14 April 2024,, Volume: 57, ISSUE: , pp: 251-259, DOI: 10.3233/ATDE240475(Scopus)
8) Chenxu DUAN*, Yifan WANG, Saru KUMARI; Research on Trajectory Planning of Industrial Robot Based on MATLAB. (Online: June 2024), Image Processing, Electronics and Computers, Proceedings of the 5th Asia-Pacific Conference [IPEC2024], Dalian, China, 12-14 April 2024, Volume: 57 , ISBN Online: 978-1-64368-524-3 , DOI: 10.3233/ATDE240480, (Scopus)
9) Ruihan Wang, Zijun Liang*, Yuqi Li, Xuejuan Zhan, Ruipeng Wang, Ran Deng, Yiran Niu, Saru Kumari; Improved Method for Intersection Multi-Events Traffic Signal Induction Control in Intelligent Connected New Energy Vehicles. (Online: June 2024 ), Intelligent Transportation and Smart Cities, Proceedings of the 1st International Conference[ICITSC2024], Wuhan, China, 7-8 March 2024, Volume: 55, ISBN Online: 978-1-64368-520-5 , DOI: 10.3233/ATDE240383, (Scopus)
10) Saru Kumari, Pooja Tyagi; Analyzing and Enhancing a User Authentication Scheme for Ad Hoc Wireless Sensor Networks. in International Conference on Cryptology & Network Security with Machine Learning(ICCNSML 2023), Part of the book series: Lecture Notes in Networks and Systems (LNNS,volume 918) Springer, Singapore: Springer Nature Singapore.(Online: 23 April 2024),pp. 505-525, 2024. Print ISBN978-981-97-0640-2 Online ISBN978-981-97-0641-9(conference held: 27 – 29 October, 2023; Organized by PSIT Kanpur) https://doi.org/10.1007/978-981-97-0641-9_35 (Scopus)
11) Shivani Goel, Mridul Kumar Gupta, Saru Kumari; Correctness Proof of the Verification of ‘A Combined Public Key Scheme in the Case of Attribute-Based for Wireless Body Area Networks’. in International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2023), Part of the book series: Lecture Notes in Networks and Systems (LNNS, volume 918) Springer, Singapore: Springer Nature Singapore. (Online: 23 April 2024), pp. 253-262, 2024. Print ISBN978-981-97-0640-2 Online ISBN978-981-97-0641-9(conference held: 27 – 29 October, 2023; Organized by PSIT Kanpur) https://doi.org/10.1007/978-981-97-0641-9_17(Scopus)
12) Sonam Yadav, Vivek Dabra, Pradeep Malik, Saru Kumari; Flaws of a Password-Based Three-Party Authenticated Key Agreement Protocol in Post-quantum Environment. In: Roy, B.K., Chaturvedi, A., Tsaban, B., Hasan, S.U. (eds) International Conference on Cryptology and Network Security with Machine Learning (ICCNSML 2022), Part of the “Algorithms for Intelligent Systems” book series (AIS), Springer, Singapore.(Online: 18 October 2023),pp 63–70, 2024 https://doi.org/10.1007/978-981-99-2229-1_6Print ISBN978-981-99-2228-4 Online ISBN978-981-99-2229-1
13) Pooja Tyagi and Saru Kumari; Security Flaws in Dhillon and Kalra's User Authentication Scheme for IoT. 2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) (pp. 1-4). IEEE.DOI: 10.1109/ICICT55121.2022.10064577(INSPEC Accession Number: 22817445)(Date of Conference: 11-12 November 2022)(Date Added to IEEE Xplore: 20 March 2023)(Scopus)
14) Yang Zhao, Zhaozhong Liu, Jingmin An, Guobin Zhu, Saru Kumari; A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios. In: Su, C., Gritzalis, D., Piuri, V. (eds) The 17th International Conference on Information Security Practice and Experience (ISPEC 2022), Part of the book series: Lecture Notes in Computer Science(LNCS,volume 13620), Springer, Cham. (Online: 19 November 2022) Volume 13620,pp 624–639 https://doi.org/10.1007/978-3-031-21280-2_35Print ISBN 978-3-031-21279-6Online ISBN978-3-031-21280-2(Scopus)
15) Rahul Kumar*, Mridul K. Gupta, SaruKuamri; ECC-based three-factor authentication scheme for multi-server environment. International Semantic Intelligence Conference (ISIC2021), MERI College, Janakpuri, New Delhi, India, 25-27 Feb. 2021, Published in CEUR Workshop Proceedings (CEUR-WS.org) ISSN 1613-0073(Scopus)
16) Mridul Kumar Gupta, Rahul Kumar, Saru Kumari; Flaws and amendment in an ECC-based authentication scheme for SIP. 9th International Conference on System Modeling and Advancement in Research Trends, SMART 2020, pp.372. IEEE conference ID: 50582, Teerthankar Mahaveer University (TMU), Moradabad, India, 4-5 Dec. 2020, DOI: 10.1109/SMART50582.2020.9336790 ISSN (PRINT): 978-1-7281-8906-2; ISSN (CD-ROM): 978-1-7281-8905-5; ISSN (USB): 978-1-7281-8907-9; ISBN: 978-1-7281-8908-6 (Scopus)
17) Marimuthu Karuppiah, Akshat Pradhan, Saru Kumari, Ruhul Amin, S. Rajkumar, Rahul Kumar; Security on “Secure remote login scheme with password and smart card update facilities.” 3rd International conference on Mathematics and Computing (ICMC, 2017), pp. 26-33, Jan. 17-21, 2017, Haldia Institute of Technology, Kolkata, India. DOI: 10.1007/978-981-10-4642-1 3 ISBN: 9811046417, 9789811046414(Scopus)
18) Saru Kumari, Marimuthu Karuppiah;Security Problems of a “More Secure Remote User Authentication Scheme” International Conference on Advanced Communication Control and Computing Technologies (ICACCCT-2016),pp. 520 - 521, 25-27 May 2016 DOI: 10.1109/ICACCCT.2016.7831694 Ramanathapuram, Tamilnadu, India.ISBN No.978-1-4673-9545-8
19) Xiong Li, Junguo Liao, Jiao Zhang, Saru Kumari, Jianwei Niu; A secure remote user mutual authentication scheme using smart cards. Computing, Communications & Applications Conference- (ComComAp 2014), DOI: 10.1109/ComComAp.2014.7017176 October, 20-22, pp. 89-92, 2014, Beijing, China. Electronic ISBN: 978-1-4799-4811-6; Print ISBN: 978-1-4799-4813-0;Print on Demand(PoD) ISBN: 978-1-4799-4810-9
20) Muhammad Khurram Khan, Saru Kumari, Xiaomin Wang, Rahul Kumar; Security Issues of Chen et al.’s Dynamic ID-based Authentication Scheme. 12thIEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2014), DOI: 10.1109/DASC.2014.31 August 24-27, pp. 125-128, 2014, Dalian, China.Electronic ISBN: 978-1-4799-5079-9;CD-ROM ISBN: 978-1-4799-5078-2;Print on Demand(PoD) ISBN: 978-1-4799-5080-5(Scopus)
21) Xiong Li, Muhammad Khurram Khan, Saru Kumari, Junguo Liao and Wei Liang; Cryptanalysis of a Robust Smart Card Authentication Scheme for Multi-server Architecture. IEEE International Symposium on Biometrics & Security Technologies (ISBAST’14), August26-27, DOI: 10.1109/ISBAST.2014.70131062014, pp. 120-123.Kuala Lumpur, Malaysia, Electronic ISBN: 978-1-4799-6444-4; CD-ROM ISBN: 978-1-4799-6443-7; Print on Demand(PoD) ISBN: 978-1-4799-6445-1
22) Saru Kumari, Muhammad Khurram Khan, Xiong Li, Rahul Kumar; Notes on “A Password-Based Remote User Authentication Scheme without Smart Card.” IEEE International Symposium on Biometrics & Security Technologies (ISBAST’14),DOI: 10.1109/ISBAST.2014.7013105, pp. 116-119, 26-27 August 2014. Kuala Lumpur, Malaysia. Electronic ISBN: 978-1-4799-6444-4; CD-ROM ISBN: 978-1-4799-6443-7; Print on Demand(PoD) ISBN: 978-1-4799-6445-1(Scopus)
23) Saru Kumari, Muhammad Khurram Khan, Fahad Bin Muhaya, R Kumar;Cryptanalysis of ‘A Robust Smart-Card-Based Remote User Password Authentication Scheme.’ IEEE International Symposium on Biometrics & Security Technologies (ISBAST’13), Chengdu, China, 2-5 July 2013.ISSN 9780769550107 076955010X 1467353132 9781467353137 9781467353137 (Attended the conference and presented the paper)
24) Muhammad Khurram Khan, Saru Kumari, Mridul Kumar Gupta;Cryptanalysis of Truong et al.’s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device. International conference on Brain Inspired Cognitive Systems (BICS 2013), Beijing, China,2013, Lecture Notes in Artificial Intelligence (LNAI), 9-11 June 2013. pp. 271-277, doi>10.1007/978-3-642-38786-9_31. ISBN: 978-3-642-38785-2 (Scopus)
25) Muhammad KhurramKhan,Saru Kumari, Mridul Kumar Gupta, Fahad T Bin Muhaya; Further Cryptanalysis of ‘A Remote Authentication Scheme Using Mobile Device.’ FourthInternational Conference on Computational Aspects of Social Networks (CASoN), in Sao Carlos Brazil, November 21-23,pp. 234 – 237, 2012.DOI: 10.1109/CASoN.2012.6412408, Electronic ISBN: 978-1-4673-4794-5; Print ISBN: 978-1-4673-4793-8; CD-ROM ISBN: 978-1-4673-4792-1
26) Saru Kumari, Muhammad KhurramKhan, Mridul Kumar Gupta, Fahad T Bin Muhaya; Cryptanalysis of “an improved timestamp-based remote user authentication scheme. Proceedings of 2012 IEEE International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (ICQR2MSE),(Chengdu, China), 15-18 June 2012, pp. 1439 - 1442 Print ISBN: 978-1-4673-0786-4 DOI: 10.1109/ICQR2MSE.2012.6246494. Electronic ISBN: 978-1-4673-0788-8; Print ISBN: 978-1-4673-0786-4; CD-ROM ISBN: 978-1-4673-0787-1; Print on Demand(PoD) ISBN: 978-1-4673-0786-4(Scopus)
27) Manoj Kumar, Mridul Kumar Gupta, Saru Kumari; Cryptanalysis of Enhancements of a Password Authentication Scheme over Insecure Networks. Proceedings of 4th International Conference on Contemporary Computing (IC3), JIIT Noida, India, 8-10 August, vol.168, pp. 524-532, 2011. ISBN 978-3-642-22605-2 (Attended the conference and presented the paper) (Scopus)
Paper in National Conference Proceedings
1) Manoj Kumar, Mridul Kumar Gupta, Saru Kumari; An Enhanced User Friendly Remote Authentication Scheme with Smart Card. Proceedings of National Conference on Methods and Models in Computing (NCM2C 2007), (JNU, Delhi, India), Dec,13-14, 2007, ISBN: 8184242719, pp. 201-208, 2007.
National Conference Attended and paper presentation
1) Anjali Harit, Saru Kumari; Use of Bilinear Pairings in Cryptography. National Seminar on “Recent Advances in Mathematics and its Computational Aspects”, Department of Mathematics, Shaheed Mangal Pandey Govt. Girls P.G. College, Madhavpuram, Meerut,11-12 Nov, 2016.
2) Kamini Chaudhary, Saru Kumari; Quantum Cryptography: A new approach for secure communications over insecure networks. National Seminar on “Recent Advances in Mathematics and its Computational Aspects”, Department of Mathematics, Shaheed Mangal Pandey Govt. Girls P.G. College, Madhavpuram, Meerut, 11-12 Nov, 2016.
3) Km. Renuka, Saru Kumari, Prateet Kumar; Cryptanalysis of a remote user authentication scheme with smart cards. National Seminar on “Recent Advances in Mathematics and its Computational Aspects”, Department of Mathematics, Shaheed Mangal Pandey Govt. Girls P.G. College, Madhavpuram, Meerut, 11-12 Nov, 2016.
4) Rahul Kumar, Saru Kumari, Rajendra Kumar; On the security of a hash function based mutual authentication protocol. National Seminar on “Recent Advances in Mathematics and its Computational Aspects” Department of Mathematics, Shaheed Mangal Pandey Govt. Girls P.G. College, Madhavpuram, Meerut,11-12 Nov, 2016.
5) Saru Kumari; Security weakness of “An efficient and complete remote user authentication scheme.” International Conference on Emerging Technologies in Science, Engineering & Management (ICETSEM 2016), Dr. K.N. Modi Institute of
Engineering and Technolgy, Modinagar, 23-24 April 2016.
6) Saru Kumari; Cryptanalysis of “A secure and efficient mutual authentication protocol using hash function” International Conference on Emerging Technologies in Science, Engineering & Management (ICETSEM 2016), Dr. K.N. Modi Institute of
Engineering and Technolgy, Modinagar, 23-24 April 2016.