Sarita Gajbhiye Meshram

Orcid: 0000-0001-5453-3791

According to our database1, Sarita Gajbhiye Meshram authored at least 32 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Prediction of precipitation using wavelet-based hybrid models considering the periodicity.
Neural Comput. Appl., September, 2024

An efficient privacy-preserved authentication technique based on conformable fractional chaotic map for TMIS under smart homes environments.
J. Supercomput., January, 2024

2023
Machine learning prediction of sediment yield index.
Soft Comput., November, 2023

An efficient certificateless group signcryption scheme using Quantum Chebyshev Chaotic Maps in HC-IoT environments.
J. Supercomput., October, 2023

2022
An efficient authentication with key agreement procedure using Mittag-Leffler-Chebyshev summation chaotic map under the multi-server architecture.
J. Supercomput., 2022

An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric.
J. Supercomput., 2022

A Multi-Layer Perceptron (MLP)-Fire Fly Algorithm (FFA)-based model for sediment prediction.
Soft Comput., 2022

Combined use of Sentinel-2 and Landsat-8 to monitor water surface area and evaluated drought risk severity using Google Earth Engine.
Earth Sci. Informatics, 2022

CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique Based on Fractional Chaotic Maps.
IEEE Access, 2022

2021
A comparative study between dynamic and soft computing models for sediment forecasting.
Soft Comput., 2021

An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps.
Soft Comput., 2021

A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment.
Soft Comput., 2021

Using Improved TOPSIS and Best Worst Method in prioritizing management scenarios for the watershed management in arid and semi-arid environments.
Soft Comput., 2021

A Lightweight Provably Secure Digital Short-Signature Technique Using Extended Chaotic Maps for Human-Centered IoT Systems.
IEEE Syst. J., 2021

An Efficient, Robust, and Lightweight Subtree-Based Three-Factor Authentication Procedure for Large-Scale DWSN in Random Oracle.
IEEE Syst. J., 2021

A Provably Secure Lightweight Subtree-Based Short Signature Scheme With Fuzzy User Data Sharing for Human-Centered IoT.
IEEE Access, 2021

2020
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem.
Soft Comput., 2020

Pragmatic approach for prioritization of flood and sedimentation hazard potential of watersheds.
Soft Comput., 2020

An efficient ID-based cryptographic technique using IFP and GDLP.
Secur. Priv., 2020

An Efficient Mobile-Healthcare Emergency Framework.
J. Medical Syst., 2020

A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing.
Int. J. Commun. Syst., 2020

OOS-SSS: An Efficient Online/Offline Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor Network.
IEEE Access, 2020

2019
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem.
Soft Comput., 2019

An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment.
Soft Comput., 2019

An efficient online/offline ID-based short signature procedure using extended chaotic maps.
Soft Comput., 2019

River flow prediction using hybrid PSOGSA algorithm based on feed-forward neural network.
Soft Comput., 2019

Comparison of AHP and fuzzy AHP models for prioritization of watersheds.
Soft Comput., 2019

Monthly long-term rainfall estimation in Central India using M5Tree, MARS, LSSVR, ANN and GEP models.
Neural Comput. Appl., 2019

2018
Chebyshev chaotic map-based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography.
Secur. Priv., 2018

Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle.
Int. J. Netw. Secur., 2018

Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs.
IET Networks, 2018

2017
An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP.
Informatica, 2017


  Loading...