Keyur Parmar

Orcid: 0000-0003-2012-0475

According to our database1, Keyur Parmar authored at least 18 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Mitigation of selfish mining attack using dynamic difficulty adjustment algorithm.
Peer Peer Netw. Appl., August, 2025

Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology.
Int. J. Inf. Sec., February, 2025

ALMASH: an anonymity-based lightweight mutual authentication scheme for internet of healthcare things.
J. Supercomput., January, 2025

2024
PGASH: Provable group-based authentication scheme for Internet of Healthcare Things.
Peer Peer Netw. Appl., March, 2024

Privacy-preserving Crime Reporting and Rewarding in the Presence of Active Insider and Outsider Adversaries.
Proceedings of the 19th International Conference on Future Networks and Communications / 21st International Conference on Mobile Systems and Pervasive Computing / 14th International Conference on Sustainable Energy Information Technology (FNC/MobiSPC/SEIT 2024), 2024

2023
A transformative shift toward blockchain-based IoT environments: Consensus, smart contracts, and future directions.
Secur. Priv., 2023

A systematic review of decentralized finance protocols.
Int. J. Intell. Networks, 2023

Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things.
Proceedings of the Information Systems Security - 19th International Conference, 2023

Privacy-preserving Authentication Scheme for VANETs using Blockchain Technology.
Proceedings of the 14th International Conference on Ambient Systems, 2023

Efficient Public Data Auditing Scheme for Healthcare Systems using ECC-Based Attribute-Based Signature in Cloud Storage.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2023

2022
Securing Cookies/Sessions Through Non-fungible Tokens.
Proceedings of the Database Systems for Advanced Applications. DASFAA 2022 International Workshops, 2022

2018
Malleable Cryptosystems and Their Applications in Wireless Sensor Networks.
Proceedings of the Computer and Network Security Essentials., 2018

2016
Malleability Resilient Concealed Data Aggregation in Wireless Sensor Networks.
Wirel. Pers. Commun., 2016

Concealed data aggregation in wireless sensor networks: A comprehensive survey.
Comput. Networks, 2016

2015
Hybrid Secure Data Aggregation in Wireless Sensor Networks.
Proceedings of the Cyber Physical Systems. Design, Modeling, and Evaluation, 2015

2014
Malleability Resilient Concealed Data Aggregation.
Proceedings of the Advances in Communication Networking, 2014

Aggregate MAC Based Authentication for Secure Data Aggregation in Wireless Sensor Networks.
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014

2012
A Novel Approach for Verifiable Secret Sharing by using a One Way Hash Function
CoRR, 2012


  Loading...