Nishant Doshi

Orcid: 0000-0003-3443-7561

According to our database1, Nishant Doshi authored at least 44 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
LDA-2IoT: A level dependent authentication using two factor for IoT paradigm.
Comput. Networks, March, 2023

An enhanced constant length traceable CP-ABE in IoT paradigm.
Int. J. Electron. Secur. Digit. Forensics, 2023

Cryptanalysis of Authentication Protocol for Cloud Assisted IoT Environment.
Proceedings of the 14th International Conference on Ambient Systems, 2023

2022
Database Management System for Smart Gym Using IoT.
J. Ubiquitous Syst. Pervasive Networks, 2022

LDA-IoT : a level dependent authentication for IoT paradigm.
Inf. Secur. J. A Glob. Perspect., 2022

Overview of Present-Day IoT Data Processing Technologies.
Proceedings of the 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2022) / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2022), 2022

A Survey on IoT-Based Smart Cars, their Functionalities and Challenges.
Proceedings of the 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2022) / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2022), 2022

An Analytical Survey of Energy Efficiency in IoT Paradigm.
Proceedings of the 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2022) / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2022), 2022

2021
Secure Lightweight Key Exchange Using ECC for User-Gateway Paradigm.
IEEE Trans. Computers, 2021

Emerging Technologies and Applications for Smart Cities.
J. Ubiquitous Syst. Pervasive Networks, 2021

Proposed DBMS for OTT platforms in line with new age requirements.
CoRR, 2021

Blood Bank Management and Inventory Control Database Management System.
Proceedings of the 12th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2021) / The 11th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2021), 2021

2020
An enhanced approach for three factor remote user authentication in multi - server environment.
J. Intell. Fuzzy Syst., 2020

A Level Dependent Authentication for IoT Paradigm.
IACR Cryptol. ePrint Arch., 2020

IoT and Modern Marketing: Its Social Implications.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

2019
Cryptanalysis of ecc-based key agreement scheme for generic IoT network model.
Proceedings of the 10th International Conference on Computing, 2019

FMD and Mastitis Disease Detection in Cows Using Internet of Things (IOT).
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

Smart cities-A case study of Porto and Ahmedabad.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

A Survey of Smart City infrastructure via Case study on New York.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

Voice-Controlled Autonomous Vehicle Using IoT.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

A Review of Smart Parking Using Internet of Things (IoT).
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

Security and Privacy Issues in Cloud, Fog and Edge Computing.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

Open Communication Protocols for Building Automation Systems.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

A Survey on Blockchain Technology and its Proposed Solutions.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

Analysis of robust weed detection techniques based on the Internet of Things (IoT).
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

Real Time Adaptive Traffic Control System : A Hybrid Approach.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

2018
An Improve Three Factor Remote User Authentication Scheme Using Smart Card.
Wirel. Pers. Commun., 2018

Analysis of Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid of IoT.
ICO, 2018

A Novel Approach for Biometric Based Remote User Authentication Scheme using Smart Card.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

2017
A password based authentication scheme for wireless multimedia systems.
Multim. Tools Appl., 2017

An analytical study of biometric based remote user authentication schemes using smart cards.
Comput. Electr. Eng., 2017

2016
A novel approach for privacy homomorphism using attribute-based encryption.
Secur. Commun. Networks, 2016

A User Privacy Conserving Authentication System Using Smart Card for Telecare Medicine Information Systems.
ICTCS, 2016

2015
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD.
IACR Cryptol. ePrint Arch., 2015

An efficient approach for privacy preserving distributed mining of association rules in unsecured environment.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption.
Secur. Commun. Networks, 2014

Approximation for the Path Complexity of Binary Search Tree.
CoRR, 2014

2012
Constant Ciphertext Length in CP-ABE.
IACR Cryptol. ePrint Arch., 2012

Updating attribute in CP-ABE: A New Approach.
IACR Cryptol. ePrint Arch., 2012

A novel approach for e-payment using virtual password system
CoRR, 2012

Efficient Cryptography Technique on Perturbed Data in Distributed Environment.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2011
Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

2010
A secure email login system using virtual password.
IACR Cryptol. ePrint Arch., 2010

A secure email login system using virtual password
CoRR, 2010


  Loading...