Sandeep K. Sood

According to our database1, Sandeep K. Sood
  • authored at least 51 papers between 2009 and 2017.
  • has a "Dijkstra number"2 of six.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
A Game Theoretic Approach for an IoT-Based Automated Employee Performance Evaluation.
IEEE Systems Journal, 2017

An Energy-Efficient Architecture for the Internet of Things (IoT).
IEEE Systems Journal, 2017

Game theoretic decision making in IoT-assisted activity monitoring of defence personnel.
Multimedia Tools Appl., 2017

Identification of malicious edge devices in fog computing environments.
Information Security Journal: A Global Perspective, 2017

Dynamic resource allocation for big data streams based on data characteristics (5Vs).
Int. Journal of Network Management, 2017

Security in IoT network based on stochastic game net model.
Int. Journal of Network Management, 2017

An intelligent and secure system for predicting and preventing Zika virus outbreak using Fog computing.
Enterprise IS, 2017

A stochastic game net-based model for effective decision-making in smart environments.
Concurrency and Computation: Practice and Experience, 2017

Wearable IoT sensor based healthcare system for identifying and controlling chikungunya virus.
Computers in Industry, 2017

Smart computing based student performance evaluation framework for engineering education.
Comp. Applic. in Engineering Education, 2017

Student career path recommendation in engineering stream based on three-dimensional model.
Comp. Applic. in Engineering Education, 2017

Efficient Resource Management System Based on 4Vs of Big Data Streams.
Big Data Research, 2017

2016
An intelligent system for predicting and preventing MERS-CoV infection outbreak.
The Journal of Supercomputing, 2016

Smart monitoring and controlling of Pandemic Influenza A (H1N1) using Social Network Analysis and cloud computing.
J. Comput. Science, 2016

An Automatic Prediction of Epileptic Seizures Using Cloud Computing and Wireless Sensor Networks.
J. Medical Systems, 2016

Temporal Informative Analysis in Smart-ICU Monitoring: M-HealthCare Perspective.
J. Medical Systems, 2016

Towards the design of a secure data outsourcing using fragmentation and secret sharing scheme.
Information Security Journal: A Global Perspective, 2016

Advanced dynamic identity-based authentication protocol using smart card.
IJICS, 2016

A Cloud-Based Seizure Alert System for Epileptic Patients That Uses Higher-Order Statistics.
Computing in Science and Engineering, 2016

Function points-based resource prediction in cloud computing.
Concurrency and Computation: Practice and Experience, 2016

2015
Matrix based proactive resource provisioning in mobile cloud environment.
Simulation Modelling Practice and Theory, 2015

Secure authentication scheme for IoT and cloud servers.
Pervasive and Mobile Computing, 2015

Advanced password based authentication scheme for wireless sensor networks.
J. Inf. Sec. Appl., 2015

Scheduling of big data applications on distributed cloud based on QoS parameters.
Cluster Computing, 2015

Cognitive decision making in smart industry.
Computers in Industry, 2015

A commercial, benefit driven and secure framework for elearning in cloud computing.
Comp. Applic. in Engineering Education, 2015

2013
Advanced remote user authentication protocol for multi-server architecture based on ECC.
J. Inf. Sec. Appl., 2013

ECC-based anti-phishing protocol for cloud computing services.
IJSN, 2013

Efficient password-authenticated key agreement protocol for smart cards based on ECC.
IJMIS, 2013

Hybrid Data Security Model for Cloud.
IJCAC, 2013

A Value Based Dynamic Resource Provisioning Model in Cloud.
IJCAC, 2013

A Value Based Dynamic Resource Provisioning Model in Cloud.
IJCAC, 2013

2012
A combined approach to ensure data security in cloud computing.
J. Network and Computer Applications, 2012

Dynamic Identity Based Authentication Protocol for Two-Server Architecture.
J. Information Security, 2012

An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol.
I. J. Network Security, 2012

SSO password-based multi-server authentication protocol.
IJCNDS, 2012

2011
Dynamic identity-based single password anti-phishing protocol.
Security and Communication Networks, 2011

A secure dynamic identity based authentication protocol for multi-server architecture.
J. Network and Computer Applications, 2011

On Secure Digital Image Watermarking Techniques.
J. Information Security, 2011

Cookie-Based Virtual Password Authentication Protocol.
Information Security Journal: A Global Perspective, 2011

Secure Dynamic Identity-Based Authentication Scheme Using Smart Cards.
Information Security Journal: A Global Perspective, 2011

Inverse Cookie-based Virtual Password Authentication Protocol.
I. J. Network Security, 2011

An improved and secure smart card-based authentication scheme.
IJMIS, 2011

Security Issues in Cloud Computing.
Proceedings of the High Performance Architecture and Grid Computing, 2011

Elliptic Curve Cryptography: Current Status and Research Challenges.
Proceedings of the High Performance Architecture and Grid Computing, 2011

Elliptic curve cryptography: survey and its security applications.
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, 2011

2010
An improvement of Hsiang-Shih's authentication scheme using smart cards.
Proceedings of the ICWET '10 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 26, 2010

Secure Dynamic Identity-Based Remote User Authentication Scheme.
Proceedings of the Distributed Computing and Internet Technology, 2010

An improvement of Xu et al.'s authentication scheme using smart cards.
Proceedings of the 3rd Bangalore Annual Compute Conference, Compute 2010, 2010

2009
A Single Sign-On Model for Web Services Based on Password Scheme.
Proceedings of the First International Conference on Computational Intelligence, 2009

Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography.
Proceedings of the First International Conference on Computational Intelligence, 2009


  Loading...