Search filters

List of works by Neeraj Kumar

<i>VaCoChain:</i> Blockchain-Based 5G-Assisted UAV Vaccine Distribution Scheme for Future Pandemics

scientific article published on 13 August 2021

A Lightweight and Verifiable Access Control Scheme With Constant Size Ciphertext in Edge-Computing-Assisted IoT

scientific article published in 2022

A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment

scientific article

A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing

scientific article published in 2022

A Probabilistic Data Structures-Based Anomaly Detection Scheme for Software-Defined Internet of Vehicles

scientific article published on 03 June 2020

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network

article

A Security- and Privacy-Preserving Approach Based on Data Disturbance for Collaborative Edge Computing in Social IoT Systems

scientific article published on 09 July 2021

A comprehensive review on landmine detection using deep learning techniques in 5G environment: open issues and challenges

scientific article published in 2022

A comprehensive survey on software‐defined networking for smart communities

scientific article published in 2022

A new handover authentication protocol based on bilinear pairing functions for wireless networks

A novel covert channel detection method in cloud based on XSRM and improved event association algorithm

article published in 2016

A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks

A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem

article by Han Shen et al published 21 January 2016 in The Journal of Supercomputing

An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography

scientific article published on 3 October 2015

An intelligent clustering algorithm for VANETs

BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system

scientific article published in 2019

Big data dimensionality reduction techniques in IoT: review, applications and open research challenges

scientific article published in 2022

Block-CPS: Blockchain and Non-Cooperative Game-based Data Pricing Scheme for Car Sharing

scientific article published in 2022

Blockchain Based Optimized Energy Trading for E-Mobility Using Quantum Reinforcement Learning

scientific article published in 2023

Blockchain-Based Co-Operative Caching for Secure Content Delivery in CCN-Enabled V2G Networks

scientific article published in 2023

Blockchain-Enabled Secure Big Data Analytics for Internet of Things Smart Applications

scientific article published in 2023

COVID-19: Secure Healthcare Internet of Things Networks, Current Trends and Challenges with Future Research Directions

scientific article published on 01 April 2023

Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems

Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things

Comments on “Efficient Public Verification of Data Integrity for Cloud Storage Systems From Indistinguishability Obfuscation”

scientific article published in 2021

Cooperation strategies for vehicular delay-tolerant networks

Deep Learning-Based Network Traffic Prediction for Secure Backbone Networks in Internet of Vehicles

scientific article published on 03 February 2022

Deep-Learning-Based Blockchain Framework for Secure Software-Defined Industrial Networks

scientific article published in 2021

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment

scientific article

Dynamic Virtual Network Embedding Algorithm Based on Graph Convolution Neural Network and Reinforcement Learning

scientific article published in 2022

Efficient Distributed Decryption Scheme for IoT Gateway-based Applications

scientific article published on 05 January 2021

Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services

scholarly article by Debiao He et al published June 2018 in IEEE Systems Journal

Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures

scholarly article by Debiao He et al published September 2016 in IEEE Transactions on Information Forensics and Security

Efficient provably secure password-based explicit authenticated key agreement

article

Energy and SLA-driven MapReduce Job Scheduling Framework for Cloud-based Cyber-Physical Systems

scientific article published on 03 May 2021

Energy-Efficient Workflow Scheduling Using Container-Based Virtualization in Software-Defined Data Centers

scientific article published on 07 April 2020

Fully Homomorphic Enabled Secure Task Offloading and Scheduling System for Transport Applications

scientific article published in 2022

Fuzzy Detection System for Rumors Through Explainable Adaptive Learning

scientific article published in 2021

Fuzzy Logic in Surveillance Big Video Data Analysis

scientific article published on 21 May 2021

Government regulations in cyber security: Framework, standards and recommendations

scientific article published in 2019

Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.

scientific article published on 6 August 2014

Machine Learning in Metaverse Security: Current Solutions and Future Challenges

scientific article published on 28 March 2024

Machine Learning-based Mist Computing Enabled Internet of Battlefield Things

scientific article published on 01 September 2021

Mean Field Game and Broadcast Encryption-based Joint Data Freshness Optimization and Privacy Preservation for Mobile Crowdsensing

scientific article published in 2023

One-to-many authentication for access control in mobile pay-TV systems

PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds

Postpartum depression prediction through pregnancy data analysis for emotion-aware smart systems

scholarly article by Mário W.L. Moreira et al published May 2019 in Information Fusion

Privacy-preserving data aggregation scheme against internal attackers in smart grids

Providing Healthcare-as-a-Service Using Fuzzy Rule Based Big Data Analytics in Cloud Computing

article

Quantum Learning-Enabled Green Communication for Next-Generation Wireless Systems

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks

article

Towards energy-aware fog-enabled cloud of things for healthcare

article