Nitish Andola

Orcid: 0000-0002-7589-717X

According to our database1, Nitish Andola authored at least 17 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Correction to: Proactive threshold‑proxy re‑encryption scheme for secure data sharing on cloud.
J. Supercomput., October, 2023

Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud.
J. Supercomput., September, 2023

Privacy-preserving cloud data sharing for healthcare systems with hybrid blockchain.
Peer Peer Netw. Appl., September, 2023

PSCLS: provably secure certificateless signature scheme for IoT device on cloud.
J. Supercomput., March, 2023

P2LBS: Privacy Provisioning in Location-Based Services.
IEEE Trans. Serv. Comput., 2023

2022
A Survey of Oblivious Transfer Protocol.
ACM Comput. Surv., January, 2022

Anonymous and Linkable Location-Based Services.
IEEE Trans. Veh. Technol., 2022

EP2LBS: efficient privacy-preserving scheme for location-based services.
J. Supercomput., 2022

Searchable encryption on the cloud: a survey.
J. Supercomput., 2022

A secure searchable encryption scheme for cloud using hash-based indexing.
J. Comput. Syst. Sci., 2022

An enhanced smart card and dynamic ID based remote multi-server user authentication scheme.
Clust. Comput., 2022

2021
SpyChain: A Lightweight Blockchain for Authentication and Anonymous Authorization in IoD.
Wirel. Pers. Commun., 2021

Anonymity on blockchain based e-cash protocols - A survey.
Comput. Sci. Rev., 2021

2020
PoEWAL: A lightweight consensus mechanism for blockchain in IoT.
Pervasive Mob. Comput., 2020

2019
Vulnerabilities on Hyperledger Fabric.
Pervasive Mob. Comput., 2019

2018
Secure and lightweight multi user searchable encryption scheme.
J. Intell. Fuzzy Syst., 2018

2017
Secure access of multiple keywords over encrypted data in cloud environment using ECC-PKI and ECC ElGamal.
Proceedings of the 2017 International Conference on Public Key Infrastructure and its Applications, 2017


  Loading...