Amit K. Awasthi

1.0k total citations · 1 hit paper
24 papers, 593 citations indexed

About

Amit K. Awasthi is a scholar working on Information Systems, Computer Networks and Communications and Artificial Intelligence. According to data from OpenAlex, Amit K. Awasthi has authored 24 papers receiving a total of 593 indexed citations (citations by other indexed papers that have themselves been cited), including 18 papers in Information Systems, 17 papers in Computer Networks and Communications and 8 papers in Artificial Intelligence. Recurrent topics in Amit K. Awasthi's work include Advanced Authentication Protocols Security (15 papers), User Authentication and Security Systems (13 papers) and Cryptography and Data Security (8 papers). Amit K. Awasthi is often cited by papers focused on Advanced Authentication Protocols Security (15 papers), User Authentication and Security Systems (13 papers) and Cryptography and Data Security (8 papers). Amit K. Awasthi collaborates with scholars based in India, Israel and Belgium. Amit K. Awasthi's co-authors include Sunil Pranit Lal, Karan Singh, R.C. Mittal, Akansha Singh, Sunder Lal, Pramod Kumar Srivastava, Madhusudan B. Kulkarni, V. Kaushik, Vishal Saraswat and Manish Bhaiyya and has published in prestigious journals such as Journal of Medical Systems, IEEE Transactions on Consumer Electronics and Computers & Electrical Engineering.

In The Last Decade

Amit K. Awasthi

23 papers receiving 546 citations

Hit Papers

Deep Learning-Enhanced Portable Chemiluminescence Biosens... 2025 2026 2025 5 10 15

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Amit K. Awasthi India 13 471 410 205 136 62 24 593
Sihan Qing China 9 265 0.6× 219 0.5× 252 1.2× 82 0.6× 8 0.1× 69 427
Chi-Yao Weng Taiwan 14 513 1.1× 490 1.2× 177 0.9× 119 0.9× 55 0.9× 28 674
Qiying Cao China 15 509 1.1× 137 0.3× 110 0.5× 101 0.7× 6 0.1× 50 683
Tian‐Fu Lee Taiwan 17 605 1.3× 587 1.4× 295 1.4× 155 1.1× 21 0.3× 45 755
Alberto Peinado Spain 10 214 0.5× 133 0.3× 151 0.7× 32 0.2× 141 2.3× 33 373
Hsu‐Chun Hsiao Taiwan 14 475 1.0× 244 0.6× 341 1.7× 127 0.9× 8 0.1× 48 714
Xiao Tan China 13 339 0.7× 405 1.0× 346 1.7× 74 0.5× 8 0.1× 27 637
Guangsong Li China 10 526 1.1× 454 1.1× 241 1.2× 142 1.0× 21 0.3× 33 604
Tianjie Cao China 12 275 0.6× 263 0.6× 194 0.9× 74 0.5× 153 2.5× 45 440
L.T. Heberlein United States 7 1.3k 2.8× 232 0.6× 861 4.2× 609 4.5× 5 0.1× 8 1.4k

Countries citing papers authored by Amit K. Awasthi

Since Specialization
Citations

This map shows the geographic impact of Amit K. Awasthi's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Amit K. Awasthi with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Amit K. Awasthi more than expected).

Fields of papers citing papers by Amit K. Awasthi

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Amit K. Awasthi. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Amit K. Awasthi. The network helps show where Amit K. Awasthi may publish in the future.

Co-authorship network of co-authors of Amit K. Awasthi

This figure shows the co-authorship network connecting the top 25 collaborators of Amit K. Awasthi. A scholar is included among the top collaborators of Amit K. Awasthi based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Amit K. Awasthi. Amit K. Awasthi is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Kaushik, V., et al.. (2025). Deep Learning-Enhanced Portable Chemiluminescence Biosensor: 3D-Printed, Smartphone-Integrated Platform for Glucose Detection. Bioengineering. 12(2). 119–119. 19 indexed citations breakdown →
2.
Awasthi, Amit K., et al.. (2024). Scaled codon usage similarity index: A comprehensive resource for crop plants. Journal of Genetic Engineering and Biotechnology. 22(4). 100441–100441. 1 indexed citations
3.
Awasthi, Amit K., et al.. (2018). Biometric based RFID tag mutual authentication protocol defending against illegitimate access. Malaya Journal of Matematik. S(1). 102–106. 4 indexed citations
4.
Saraswat, Vishal, et al.. (2017). A secure anonymous proxy signcryption scheme. Journal of Mathematical Cryptology. 11(2). 63–84. 7 indexed citations
5.
Awasthi, Amit K., et al.. (2017). Privacy Model for Threshold RFID System Based on PUF. Wireless Personal Communications. 95(3). 2803–2828. 9 indexed citations
6.
Singh, Akansha, Amit K. Awasthi, & Karan Singh. (2016). Lightweight multilevel key management scheme for large scale wireless sensor network. International Conference on Computing for Sustainable Global Development. 3014–3017. 3 indexed citations
7.
Singh, Akansha, Amit K. Awasthi, & Karan Singh. (2016). Cryptanalysis and Improvement in User Authentication and Key Agreement Scheme for Wireless Sensor Network. Wireless Personal Communications. 94(3). 1881–1898. 21 indexed citations
8.
Awasthi, Amit K., et al.. (2014). A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System. Journal of Medical Systems. 39(1). 153–153. 51 indexed citations
9.
Awasthi, Amit K., et al.. (2013). RFID Authentication Protocol to Enhance Patient Medication Safety. Journal of Medical Systems. 37(6). 9979–9979. 30 indexed citations
10.
Singh, Karan & Amit K. Awasthi. (2013). Quality, Reliability, Security and Robustness in Heterogeneous Networks. Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. 29 indexed citations
11.
Awasthi, Amit K., et al.. (2013). A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce. Journal of Medical Systems. 37(5). 9964–9964. 56 indexed citations
12.
13.
Awasthi, Amit K.. (2010). Remarks on the security of the strong proxy signature scheme with proxy signer privacy protection. International Journal of Information and Computer Security. 4(1). 24–24. 1 indexed citations
14.
Awasthi, Amit K. & Sunder Lal. (2007). ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. International journal of network security. 4(2). 187–192. 36 indexed citations
15.
Awasthi, Amit K.. (2005). On the Authentication of the User from the Remote Autonomous Object. International journal of network security. 1(3). 166–167. 5 indexed citations
16.
Awasthi, Amit K. & Sunder Lal. (2004). Id-Based Directed Signature Scheme from Pairings. SSRN Electronic Journal.
17.
Awasthi, Amit K. & Sunder Lal. (2004). A Scheme for Obtaining a Warrant Message from the Digital Proxy Signatures. SSRN Electronic Journal. 3 indexed citations
18.
Awasthi, Amit K. & Sunil Pranit Lal. (2004). An enhanced remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics. 50(2). 583–586. 48 indexed citations
19.
Awasthi, Amit K.. (2004). Comment on a dynamic ID-based remote user authentication scheme. 1(2). 49 indexed citations
20.
Awasthi, Amit K. & Sunil Pranit Lal. (2003). A remote user authentication scheme using smart cards with forward secrecy. IEEE Transactions on Consumer Electronics. 49(4). 1246–1248. 75 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026