Sachin Kumar

Orcid: 0000-0002-5324-2156

Affiliations:
  • Ajay Kumar Garg Engineering College, Ghaziabad, India


According to our database1, Sachin Kumar authored at least 30 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A survey on the blockchain techniques for the Internet of Vehicles security.
Trans. Emerg. Telecommun. Technol., April, 2024

Privacy preserving support vector machine based on federated learning for distributed IoT-enabled data analysis.
Comput. Intell., April, 2024

Practical Feature Inference Attack in Vertical Federated Learning During Prediction in Artificial Internet of Things.
IEEE Internet Things J., January, 2024

2023
Privacy-preserving authentication scheme for digital twin-enabled autonomous vehicle environments.
Trans. Emerg. Telecommun. Technol., November, 2023

DisBezant: Secure and Robust Federated Learning Against Byzantine Attack in IoT-Enabled MTS.
IEEE Trans. Intell. Transp. Syst., February, 2023

Deep Semantics Sorting of Voice-Interaction-Enabled Industrial Control System.
IEEE Internet Things J., February, 2023

An energy and time-saving task scheduling algorithm for UAV-IoT collaborative system.
Microprocess. Microsystems, 2023

A secure protocol for patient monitoring in wireless body area networks.
Concurr. Comput. Pract. Exp., 2023

2022
Forward Privacy Preservation in IoT-Enabled Healthcare Systems.
IEEE Trans. Ind. Informatics, 2022

An authentication and key agreement scheme for smart grid.
Peer-to-Peer Netw. Appl., 2022

Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems.
IEEE Internet Things J., 2022

Energy-efficient fog computing in Internet of Things based on Routing Protocol for Low-Power and Lossy Network with Contiki.
Int. J. Commun. Syst., 2022

A verifiable hidden policy CP-ABE with decryption testing scheme and its application in VANET.
Trans. Emerg. Telecommun. Technol., 2022

An efficient certificateless public key encryption with equality test toward Internet of Vehicles.
Trans. Emerg. Telecommun. Technol., 2022

Proxy re-encryption with equality test for secure data sharing in Internet of Things-based healthcare systems.
Trans. Emerg. Telecommun. Technol., 2022

2021
A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2021

Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System.
Secur. Commun. Networks, 2021

Verifiable dynamic ranked search with forward privacy over encrypted cloud data.
Peer-to-Peer Netw. Appl., 2021

Lightweight authentication protocol in edge-based smart grid environment.
EURASIP J. Wirel. Commun. Netw., 2021

Transfer reinforcement learning-based road object detection in next generation IoT domain.
Comput. Networks, 2021

Strong key-insulated secure and energy-aware certificateless authentication scheme for VANETs.
Comput. Electr. Eng., 2021

Secure outsourced attribute-based signcryption for cloud-based Internet of Vehicles in a smart city.
Ann. des Télécommunications, 2021

Practical Identity Based Online/Off-Line Signcryption Scheme for Secure Communication in Internet of Things.
IEEE Access, 2021

2020
An Improved Blockchain-Based Authentication Protocol for IoT Network Management.
Secur. Commun. Networks, 2020

Decentralized Private Information Sharing Protocol on Social Networks.
Secur. Commun. Networks, 2020

Fake news detection using deep learning models: A novel approach.
Trans. Emerg. Telecommun. Technol., 2020

An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks.
IEEE Access, 2020

RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications.
IEEE Access, 2020

2019
Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks.
Sensors, 2019

An improvised indexing technique for XML data over multiple channels in wireless environment: (1, Xm) method.
Int. J. Commun. Syst., 2019


  Loading...