Sankita J. Patel

According to our database1, Sankita J. Patel authored at least 27 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture.
Clust. Comput., April, 2024

A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier.
Concurr. Comput. Pract. Exp., 2024

ESAF: An Efficient and Secure Authentication Framework for V2G Network.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

2023
Homomorphic cryptosystem-based secure data processing model for edge-assisted IoT healthcare systems.
Internet Things, July, 2023

SE-LAKAF: Security enhanced lightweight authentication and key agreement framework for smart grid network.
Peer Peer Netw. Appl., May, 2023

Dynamically scalable privacy-preserving authentication protocol for distributed IoT based healthcare service providers.
Wirel. Networks, April, 2023

Key-aggregate searchable encryption with multi-user authorization and keyword untraceability for distributed IoT healthcare systems.
Trans. Emerg. Telecommun. Technol., April, 2023

On prevention of attribute disclosure and identity disclosure against insider attack in collaborative social network data publishing.
Int. J. Bus. Intell. Data Min., 2023

2022
Privacy-preserving collaborative social network data publishing against colluding data providers.
Int. J. Inf. Comput. Secur., 2022

A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing.
Computing, 2022

2021
Detecting Intra-Conflicts in Non-Functional Requirements.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2021

Securing fingerprint templates by enhanced minutiae-based encoding scheme in Fuzzy Commitment.
IET Inf. Secur., 2021

Privacy Preserving Scalable Authentication Protocol with Partially Trusted Third Party for Distributed Internet-of-Things.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2020
Design of secure authentication protocol for dynamic user addition in distributed Internet-of-Things.
Comput. Networks, 2020

A Semi-automated Approach to Generate an Adaptive Quality Attribute Relationship Matrix.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2020

2019
Privacy Preserving Approach in Dynamic Social Network Data Publishing.
Proceedings of the Information Security Practice and Experience, 2019

A Novel k-Anonymization Approach to Prevent Insider Attack in Collaborative Social Network Data Publishing.
Proceedings of the Information Systems Security - 15th International Conference, 2019

An Ontological Approach to Specify Conflicts among Non-Functional Requirements.
Proceedings of the 2019 2nd International Conference on Geoinformatics and Data Analysis, 2019

A Context-Aware Approach to Enhance Service Utility for Location Privacy in Internet of Things.
Proceedings of the Advances in Computing and Data Sciences, 2019

2018
k-NMF Anonymization in Social Network Data Publishing.
Comput. J., 2018

2017
Mutual Friend Attack Prevention in Social Network Data Publishing.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017

2016
Specification of Non-Functional Requirements: A Hybrid Approach.
Proceedings of the Joint Proceedings of REFSQ-2016 Workshops, 2016

2014
Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Verifiable Secret Sharing Scheme.
Int. J. Distributed Syst. Technol., 2014

2013
Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Zero Knowledge Proof.
Proceedings of the Distributed Computing and Internet Technology, 2013

2012
Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks
CoRR, 2012

An Efficient Approach for Privacy Preserving Distributed K-Means Clustering Based on Shamir's Secret Sharing Scheme.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

2009
Replay Protection at the Link Layer Security in Wireless Sensor Networks.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009


  Loading...