Neeraj Kumar

According to our database1, Neeraj Kumar
  • authored at least 139 papers between 2009 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Efficient revocable ID-based encryption with cloud revocation server.
Int. J. Communication Systems, 2018

PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds.
Future Generation Comp. Syst., 2018

A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment.
Future Generation Comp. Syst., 2018

A robust and anonymous patient monitoring system using wireless medical sensor networks.
Future Generation Comp. Syst., 2018

2017
Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network.
Wireless Personal Communications, 2017

An Efficient Multiclass Classifier Using On-Page Positive Personality Features for Web Page Classification for the Next Generation Wireless Communication Networks.
Wireless Personal Communications, 2017

Container-as-a-Service at the Edge: Trade-off between Energy Efficiency and Service Availability at Fog Nano Data Centers.
IEEE Wireless Commun., 2017

REMA: A REsource MAnagement tool to improve the performance of vehicular delay-tolerant networks.
Vehicular Communications, 2017

Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries.
IEEE Trans. Smart Grid, 2017

Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment.
IEEE Trans. Industrial Informatics, 2017

Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System.
IEEE Trans. Information Forensics and Security, 2017

ReIDD: reliability-aware intelligent data dissemination protocol for broadcast storm problem in vehicular ad hoc networks.
Telecommunication Systems, 2017

Cooperative Strategies for Challenged Networks and Applications: A Survey.
IEEE Systems Journal, 2017

Cloud-Assisted Context-Aware Vehicular Cyber-Physical System for PHEVs in Smart Grid.
IEEE Systems Journal, 2017

Anonymous Authentication for Wireless Body Area Networks With Provable Security.
IEEE Systems Journal, 2017

Secure public data auditing scheme for cloud storage in smart city.
Personal and Ubiquitous Computing, 2017

Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing.
MONET, 2017

Game theoretic approach for real-time data dissemination and offloading in vehicular ad hoc networks.
J. Real-Time Image Processing, 2017

Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment.
IEEE Internet of Things Journal, 2017

A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks.
Int. Journal of Network Management, 2017

An efficient energy-aware predictive clustering approach for vehicular ad hoc networks.
Int. J. Communication Systems, 2017

Special Issue on 5G Wireless Networks for IoT and Body Sensors.
Computer Networks, 2017

A Multi-Tenant Cloud-Based DC Nano Grid for Self-Sustained Smart Buildings in Smart Cities.
IEEE Communications Magazine, 2017

Network Service Chaining in Fog and Cloud Computing for the 5G Environment: Data Management and Security Challenges.
IEEE Communications Magazine, 2017

Data Offloading in 5G-Enabled Software-Defined Vehicular Networks: A Stackelberg-Game-Based Approach.
IEEE Communications Magazine, 2017

Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies.
Computers & Electrical Engineering, 2017

Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.
Applied Mathematics and Computation, 2017

Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks.
IEEE Access, 2017

On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services.
IEEE Access, 2017

Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices.
IEEE Access, 2017

On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems.
IEEE Access, 2017

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications.
IEEE Access, 2017

An efficient fuzzy rule-based big data analytics scheme for providing healthcare-as-a-service.
Proceedings of the IEEE International Conference on Communications, 2017

Home-based exercise system for patients using IoT enabled smart speaker.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

FAAL: Fog computing-based patient monitoring system for ambient assisted living.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

2016
Privacy-preserving data aggregation scheme against internal attackers in smart grids.
Wireless Networks, 2016

Mobile cloud networking for efficient energy management in smart grid cyber-physical systems.
IEEE Wireless Commun., 2016

MobiCoop: An Incentive-Based Cooperation Solution for Mobile Applications.
TOMCCAP, 2016

A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem.
The Journal of Supercomputing, 2016

Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid.
IEEE Trans. Industrial Informatics, 2016

Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures.
IEEE Trans. Information Forensics and Security, 2016

An adaptive cache invalidation technique for wireless environments.
Telecommunication Systems, 2016

Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment.
IEEE Trans. Dependable Sec. Comput., 2016

Energy-Efficient Multimedia Data Dissemination in Vehicular Clouds: Stochastic-Reward-Nets-Based Coalition Game Approach.
IEEE Systems Journal, 2016

A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography.
Security and Communication Networks, 2016

A novel covert channel detection method in cloud based on XSRM and improved event association algorithm.
Security and Communication Networks, 2016

An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design.
Security and Communication Networks, 2016

A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.
Security and Communication Networks, 2016

An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud.
Peer-to-Peer Networking and Applications, 2016

An efficient scheme for automatic web pages categorization using the support vector machine.
The New Review of Hypermedia and Multimedia, 2016

Wireless and Mobile Technologies for the Internet of Things.
Mobile Information Systems, 2016

An efficient image retrieval scheme for colour enhancement of embedded and distributed surveillance images.
Neurocomputing, 2016

Secure clustering for efficient data dissemination in vehicular cyber-physical systems.
Future Generation Comp. Syst., 2016

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks.
Computer Networks, 2016

Vehicular delay-tolerant networks for smart grid data management using mobile edge computing.
IEEE Communications Magazine, 2016

One-to-many authentication for access control in mobile pay-TV systems.
SCIENCE CHINA Information Sciences, 2016

Learning Automata-assisted Predictive Clustering approach for Vehicular Cyber-Physical System.
Computers & Electrical Engineering, 2016

Lightweight Authentication Protocol for RFID-Enabled Systems Based on ECC.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

SDN-Based Data Center Energy Management System Using RES and Electric Vehicles.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Secure message communication among vehicles using elliptic curve cryptography in smart cities.
Proceedings of the International Conference on Computer, 2016

2015
Cooperative Gateway Cache Invalidation Scheme for Internet-Based Vehicular Ad Hoc Networks.
Wireless Personal Communications, 2015

A Novel Resource Reservation Scheme for Mobile PHEVs in V2G Environment Using Game Theoretical Approach.
IEEE Trans. Vehicular Technology, 2015

Optimized clustering for data dissemination using stochastic coalition game in vehicular cyber-physical systems.
The Journal of Supercomputing, 2015

Intelligent Mobile Video Surveillance System as a Bayesian Coalition Game in Vehicular Sensor Networks: Learning Automata Approach.
IEEE Trans. Intelligent Transportation Systems, 2015

QoS-Aware Hierarchical Web Caching Scheme for Online Video Streaming Applications in Internet-Based Vehicular Ad Hoc Networks.
IEEE Trans. Industrial Electronics, 2015

A lifetime extended multi-levels heterogeneous routing protocol for wireless sensor networks.
Telecommunication Systems, 2015

Critical applications in vehicular ad hoc/sensor networks.
Telecommunication Systems, 2015

Secure pseudonym-based near field communication protocol for the consumer internet of things.
IEEE Trans. Consumer Electronics, 2015

Collaborative Learning Automata-Based Routing for Rescue Operations in Dense Urban Regions Using Vehicular Sensor Networks.
IEEE Systems Journal, 2015

Collaborative-Learning-Automata-Based Channel Assignment With Topology Preservation for Wireless Mesh Networks Under QoS Constraints.
IEEE Systems Journal, 2015

An improved authentication protocol for session initiation protocol using smart card.
Peer-to-Peer Networking and Applications, 2015

On the security of a certificateless online/offline signcryption for Internet of Things.
Peer-to-Peer Networking and Applications, 2015

Cognitive radio-based clustering for opportunistic shared spectrum access to enhance lifetime of wireless sensor network.
Pervasive and Mobile Computing, 2015

Efficient provably secure password-based explicit authenticated key agreement.
Pervasive and Mobile Computing, 2015

Performance analysis of Bayesian coalition game-based energy-aware virtual machine migration in vehicular mobile cloud.
IEEE Network, 2015

A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography.
Multimedia Tools Appl., 2015

A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments.
Multimedia Tools Appl., 2015

Replication-Aware Data Dissemination for Vehicular Ad Hoc Networks using Location Determination.
MONET, 2015

An Intelligent Context-aware Congestion Resolution Protocol for Data Dissemination in Vehicular Ad Hoc Networks.
MONET, 2015

QoS-Aware Data Dissemination for Dense Urban Regions in Vehicular Ad Hoc Networks.
MONET, 2015

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks.
Multimedia Syst., 2015

A systematic review on heterogeneous routing protocols for wireless sensor network.
J. Network and Computer Applications, 2015

An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Systems, 2015

An intelligent approach for building a secure decentralized public key infrastructure in VANET.
J. Comput. Syst. Sci., 2015

A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks.
Inf. Sci., 2015

Coalition Games for Spatio-Temporal Big Data in Internet of Vehicles Environment: A Comparative Analysis.
IEEE Internet of Things Journal, 2015

Reliable multicast as a Bayesian coalition game for a non-stationary environment in vehicular ad hoc networks: a learning automata-based approach.
IJAHUC, 2015

A new handover authentication protocol based on bilinear pairing functions for wireless networks.
IJAHUC, 2015

Bayesian Coalition Game for Contention-Aware Reliable Data Forwarding in Vehicular Mobile Cloud.
Future Generation Comp. Syst., 2015

Bayesian coalition game for the internet of things: an ambient intelligence-based evaluation.
IEEE Communications Magazine, 2015

Cooperation strategies for vehicular delay-tolerant networks.
IEEE Communications Magazine, 2015

An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing.
Cluster Computing, 2015

Bayesian Coalition Game-based optimized clustering in Wireless Sensor Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A hybrid system to stimulate selfish nodes to cooperate in vehicular Delay-Tolerant Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

An Energy Efficient Data Dissemination and Information Retrieval Scheme for VANET.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

Collaborative P2P context-aware information propagation in vehicular ad hoc networks.
Proceedings of the 19th IEEE International Conference on Computer Supported Cooperative Work in Design, 2015

2014
OANTALG: An Orientation Based Ant Colony Algorithm for Mobile Ad Hoc Networks.
Wireless Personal Communications, 2014

Networks of learning automata for the vehicular environment: a performance analysis study.
IEEE Wireless Commun., 2014

A systematic review on routing protocols for Vehicular Ad Hoc Networks.
Vehicular Communications, 2014

Clustering in vehicular ad hoc networks: Taxonomy, challenges and solutions.
Vehicular Communications, 2014

Detection and analysis of secure intelligent universal designated verifier signature scheme for electronic voting system.
The Journal of Supercomputing, 2014

An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks.
The Journal of Supercomputing, 2014

Enhanced three-factor security protocol for consumer USB mass storage devices.
IEEE Trans. Consumer Electronics, 2014

Peer-to-Peer Cooperative Caching for Data Dissemination in Urban Vehicular Communications.
IEEE Systems Journal, 2014

LA-EEHSC: Learning automata-based energy efficient heterogeneous selective clustering for wireless sensor networks.
J. Network and Computer Applications, 2014

ANTALG: An Innovative ACO based Routing Algorithm for MANETs.
J. Network and Computer Applications, 2014

Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol.
J. Medical Systems, 2014

Bayesian Coalition Game as-a-Service for Content Distribution in Internet of Vehicles.
IEEE Internet of Things Journal, 2014

EEMHR: Energy-efficient multilevel heterogeneous routing protocol for wireless sensor networks.
Int. J. Communication Systems, 2014

Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing.
Frontiers of Computer Science, 2014

Learning Automata-based Opportunistic Data Aggregation and Forwarding scheme for alert generation in Vehicular Ad Hoc Networks.
Computer Communications, 2014

Achieving Quality of Service (QoS) Using Resource Allocation and Adaptive Scheduling in Cloud Computing with Grid Support.
Comput. J., 2014

Collaborative trust aware intelligent intrusion detection in VANETs.
Computers & Electrical Engineering, 2014

An intelligent clustering algorithm for VANETs.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Routing as a Bayesian Coalition Game in Smart Grid Neighborhood Area Networks: Learning Automata-based approach.
Proceedings of the IEEE International Conference on Communications, 2014

2013
ELACCA: Efficient Learning Automata Based Cell Clustering Algorithm for Wireless Sensor Networks.
Wireless Personal Communications, 2013

Anonymous two-factor authentication for consumer roaming service in global mobility networks.
IEEE Trans. Consumer Electronics, 2013

ALCA: agent learning-based clustering algorithm in vehicular ad hoc networks.
Personal and Ubiquitous Computing, 2013

Concurrent multipath transmission with forward error correction mechanism to overcome burst packet losses for delay-sensitive video streaming in wireless home networks.
Multimedia Tools Appl., 2013

Probabilistic trust aware data replica placement strategy for online video streaming applications in vehicular delay tolerant networks.
Mathematical and Computer Modelling, 2013

UBMR-CA: Utility-based multicast routing and channel assignment with varying traffic demands in multi-radio multi-channel wireless mesh networks.
Mathematical and Computer Modelling, 2013

A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks.
J. Network and Computer Applications, 2013

Load balancing and adaptive scheduling for data intensive prioritised traffic in multi-radio multi-channel wireless mesh networks.
IJAHUC, 2013

A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks.
Proceedings of the International Symposium on Wireless and pervasive Computing, 2013

Efficient TDMA based virtual back off algorithm for adaptive data dissemination in VANETs.
Proceedings of the International Symposium on Wireless and pervasive Computing, 2013

Learning Automata Based Contention Aware Data Forwarding Scheme for Safety Applications in Vehicular Ad Hoc Networks.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

EHE-LEACH: Enhanced heterogeneous LEACH protocol for lifetime enhancement of wireless SNs.
Proceedings of the International Conference on Advances in Computing, 2013

2012
Distributed context aware collaborative filtering approach for P2P service selection and recovery in wireless mesh networks.
Peer-to-Peer Networking and Applications, 2012

Ant colony algorithms in MANETs: A review.
J. Network and Computer Applications, 2012

Agent assisted mobility and load aware fast handoff scheme in wireless mesh networks.
IJIPT, 2012

Capacity and load-aware service discovery with service selection in peer-to-peer grids.
Future Generation Comp. Syst., 2012

A novel minimum delay maximum flow multicast algorithm to construct a multicast tree in wireless mesh networks.
Computers & Mathematics with Applications, 2012

A Novel Hybrid Approach for Web Caching.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
An ant based multi constraints QoS aware service selection algorithm in Wireless Mesh Networks.
Simulation Modelling Practice and Theory, 2011

Capacity and interference aware link scheduling with channel assignment in wireless mesh networks.
J. Network and Computer Applications, 2011

Routing in WDM based wireless mesh networks with capacity estimation.
IJIPT, 2011

Distributed Context Aware Collaborative Filtering Approach for Service Selection in Wireless Mesh Networks.
Proceedings of the Conceptual Structures for Discovering Knowledge, 2011

2010
An Inter-Domain Agent Based Secure Authorization and Communication for Mobile Clients in Wireless AdHoc Networks.
IJMCMC, 2010

2009
Neural Network Based Energy Efficient Clustering and Routing in Wireless Sensor Networks.
Proceedings of the First International Conference on Networks and Communications, 2009


  Loading...