Ashutosh Dhar Dwivedi

Orcid: 0000-0001-8010-6275

According to our database1, Ashutosh Dhar Dwivedi authored at least 45 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Securing IoT devices: A novel approach using blockchain and quantum cryptography.
Internet Things, April, 2024

Blockchain and artificial intelligence for 5G-enabled Internet of Things: Challenges, opportunities, and solutions.
Trans. Emerg. Telecommun. Technol., April, 2024

2023
Federated learning based Covid-19 detection.
Expert Syst. J. Knowl. Eng., June, 2023

Security analysis of lightweight IoT encryption algorithms: SIMON and SIMECK.
Internet Things, April, 2023

DeCrypt: a 3DES inspired optimised cryptographic algorithm.
J. Ambient Intell. Humaniz. Comput., 2023

A Privacy-Preserving Internet of Things Smart Healthcare Financial System.
IEEE Internet Things J., 2023

CincoCrypto - A Cryptocurrency Price Forecasting Tool for Everyone.
Proceedings of the Recent Trends in Image Processing and Pattern Recognition, 2023

Sustainable and Secure Renewable Energy Trading System Based on Digital Twin, Blockchain and Game Theory Integration.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023

Price Prediction of Digital Currencies using Machine Learning.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

2022
Precise Marketing Data Mining Method of E-Commerce Platform Based on Association Rules.
Mob. Networks Appl., December, 2022

Blockchain-based Framework for Reducing Fake or Vicious News Spread on Social Media/Messaging Platforms.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2022

n-Player Stochastic Duel Game Model with Applied Deep Learning and Its Modern Implications.
Sensors, 2022

ABCanDroid: A Cloud Integrated Android App for Noninvasive Early Breast Cancer Detection Using Transfer Learning.
Sensors, 2022

Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things.
J. Ambient Intell. Humaniz. Comput., 2022

Privacy-preserving ledger for blockchain and Internet of Things-enabled cyber-physical systems.
Comput. Electr. Eng., 2022

Data Driven based Malicious URL Detection using Explainable AI.
Proceedings of the IEEE International Conference on Trust, 2022

AUTODEEPSLICE: A Data Driven Network Slicing Technique of 5G network using Automatic Deep Learning.
Proceedings of the IEEE Globecom 2022 Workshops, 2022

DBNex: Deep Belief Network and Explainable AI based Financial Fraud Detection.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Security and Privacy of Patient Information in Medical Systems Based on Blockchain Technology.
ACM Trans. Multim. Comput. Commun. Appl., 2021

BRISK: Dynamic Encryption Based Cipher for Long Term Security.
Sensors, 2021

A digital rights management system based on a scalable blockchain.
Peer-to-Peer Netw. Appl., 2021

Correction to: A digital rights management system based on a scalable blockchain.
Peer-to-Peer Netw. Appl., 2021

2020
Internet of Things Based Blockchain for Temperature Monitoring and Counterfeit Pharmaceutical Prevention.
Sensors, 2020

Security Analysis of Lightweight IoT Cipher: Chaskey.
Cryptogr., 2020

A game theoretic analysis of resource mining in blockchain.
Clust. Comput., 2020

SLIM: A Lightweight Block Cipher for Internet of Health Things.
IEEE Access, 2020

Role of Blockchain in Forestalling Pandemics.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

Tracing the Source of Fake News using a Scalable Blockchain Distributed Network.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

2019
A Decentralized Privacy-Preserving Healthcare Blockchain for IoT.
Sensors, 2019

Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM.
Cryptogr., 2019

Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices.
IEEE Access, 2019

Optimized Blockchain Model for Internet of Things based Healthcare Applications.
Proceedings of the 42nd International Conference on Telecommunications and Signal Processing, 2019

Where's @Waldo?: Finding Users on Twitter.
Proceedings of the Artificial Intelligence and Soft Computing, 2019

Blockchain Education.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

2018
Differential-linear and related key cryptanalysis of round-reduced scream.
Inf. Process. Lett., 2018

Bitcoin Mining: A Game Theoretic Analysis.
IACR Cryptol. ePrint Arch., 2018

Differential Cryptanalysis in ARX Ciphers, Applications to LEA.
IACR Cryptol. ePrint Arch., 2018

Differential cryptanalysis in ARX ciphers, Application to SPECK.
IACR Cryptol. ePrint Arch., 2018

Automated Remote Patient Monitoring: Data Sharing and Privacy Using Blockchain.
CoRR, 2018

Differential Cryptanalysis of Round-Reduced LEA.
IEEE Access, 2018

Crypto-democracy: A Decentralized Voting Scheme using Blockchain Technology.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

PHANTOM Protocol as the New Crypto-Democracy.
Proceedings of the Computer Information Systems and Industrial Management, 2018

2017
Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Differential and Rotational Cryptanalysis of Round-reduced MORUS.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

2016
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition.
IACR Cryptol. ePrint Arch., 2016


  Loading...