Chandrashekhar Meshram

Orcid: 0000-0003-2434-8928

According to our database1, Chandrashekhar Meshram authored at least 52 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An efficient privacy-preserved authentication technique based on conformable fractional chaotic map for TMIS under smart homes environments.
J. Supercomput., January, 2024

2023
Machine learning prediction of sediment yield index.
Soft Comput., November, 2023

An efficient certificateless group signcryption scheme using Quantum Chebyshev Chaotic Maps in HC-IoT environments.
J. Supercomput., October, 2023

An efficient provably secure verifier-based authentication protocol using fractional chaotic maps in telecare medicine information systems.
Soft Comput., May, 2023

An Efficient Anonymous Authentication Technique for TMIS under the Smart Home Environment.
Proceedings of the International Conference on Computer, 2023

A Robust Remote Client Password Authentication Technique for Smart Cities E-Governance Applications.
Proceedings of the International Conference on Communications, 2023

2022
An efficient authentication with key agreement procedure using Mittag-Leffler-Chebyshev summation chaotic map under the multi-server architecture.
J. Supercomput., 2022

An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric.
J. Supercomput., 2022

A Multi-Layer Perceptron (MLP)-Fire Fly Algorithm (FFA)-based model for sediment prediction.
Soft Comput., 2022

Performance Measurement System and Quality Management in Data-Driven Industry 4.0: A Review.
Sensors, 2022

Barriers of managing cloud outsource software development projects: a multivocal study.
Multim. Tools Appl., 2022

An Efficient Conformable Fractional Chaotic Map-Based Online/Offline IBSS Scheme for Provable Security in ROM.
Complex., 2022

CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique Based on Fractional Chaotic Maps.
IEEE Access, 2022

An Efficient Authentication Technique using Convolution Chebyshev Chaotic Maps for TMIS.
Proceedings of the International Conference on Communications, 2022

An Efficient Digital Short Signature Scheme using CCM for HC-IoT Environments.
Proceedings of the International Conference on Communications, 2022

2021
Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function.
J. Supercomput., 2021

A comparative study between dynamic and soft computing models for sediment forecasting.
Soft Comput., 2021

An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps.
Soft Comput., 2021

A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment.
Soft Comput., 2021

A Lightweight Provably Secure Digital Short-Signature Technique Using Extended Chaotic Maps for Human-Centered IoT Systems.
IEEE Syst. J., 2021

An Efficient, Robust, and Lightweight Subtree-Based Three-Factor Authentication Procedure for Large-Scale DWSN in Random Oracle.
IEEE Syst. J., 2021

A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments.
Sensors, 2021

An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps.
Sensors, 2021

IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks.
IEEE Access, 2021

A Provably Secure Lightweight Subtree-Based Short Signature Scheme With Fuzzy User Data Sharing for Human-Centered IoT.
IEEE Access, 2021

An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS.
IEEE Access, 2021

An Effective Fair Off-Line Electronic Cash Protocol using Extended Chaotic Maps with Anonymity Revoking Trustee.
Proceedings of the International Conference on Communications, 2021

2020
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem.
Soft Comput., 2020

An efficient ID-based cryptographic technique using IFP and GDLP.
Secur. Priv., 2020

An Efficient Mobile-Healthcare Emergency Framework.
J. Medical Syst., 2020

A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing.
Int. J. Commun. Syst., 2020

OOS-SSS: An Efficient Online/Offline Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor Network.
IEEE Access, 2020

Multicriteria Decision Making Taxonomy of Cloud-Based Global Software Development Motivators.
IEEE Access, 2020

An Efficient Robust Lightweight Remote User Authentication Protocol using Extended Chaotic Maps.
Proceedings of the International Conference on Computer, 2020

New Efficient QERPKC based on Partial Discrete Logarithm Problem.
Proceedings of the International Conference on Computer, 2020

Parallelization of Global Sequence Alignment on Graphics Processing Unit.
Proceedings of the International Conference on Communications, 2020

2019
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem.
Soft Comput., 2019

An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment.
Soft Comput., 2019

An efficient online/offline ID-based short signature procedure using extended chaotic maps.
Soft Comput., 2019

River flow prediction using hybrid PSOGSA algorithm based on feed-forward neural network.
Soft Comput., 2019

Comparison of AHP and fuzzy AHP models for prioritization of watersheds.
Soft Comput., 2019

An Efficient EUF-ID-CMA Secure Identity-based Short Signature Scheme using Discrete Logarithm.
Proceedings of the 2019 International Conference on Computer, 2019

2018
Chebyshev chaotic map-based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography.
Secur. Priv., 2018

Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle.
Int. J. Netw. Secur., 2018

Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs.
IET Networks, 2018

2017
A secure key authentication scheme for cryptosystems based on GDLP and IFP.
Soft Comput., 2017

An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP.
Informatica, 2017

2015
An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem.
Inf. Process. Lett., 2015

An ID-based Quadratic-Exponentiation Randomized Cryptographic scheme.
Proceedings of the International Conference on Computer, 2015

2013
An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem.
Inf. Process. Lett., 2013

2012
An ID-based cryptographic mechanisms based on GDLP and IFP.
Inf. Process. Lett., 2012

2011
An identity based beta cryptosystem.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011


  Loading...