Sarita Gajbhiye Meshram

According to our database1, Sarita Gajbhiye Meshram authored at least 16 papers between 2017 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 





An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem.
Soft Comput., 2020

Pragmatic approach for prioritization of flood and sedimentation hazard potential of watersheds.
Soft Comput., 2020

An efficient ID-based cryptographic technique using IFP and GDLP.
Secur. Priv., 2020

An Efficient Mobile-Healthcare Emergency Framework.
J. Medical Syst., 2020

A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing.
Int. J. Commun. Syst., 2020

OOS-SSS: An Efficient Online/Offline Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor Network.
IEEE Access, 2020

An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem.
Soft Comput., 2019

An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment.
Soft Comput., 2019

An efficient online/offline ID-based short signature procedure using extended chaotic maps.
Soft Comput., 2019

River flow prediction using hybrid PSOGSA algorithm based on feed-forward neural network.
Soft Comput., 2019

Comparison of AHP and fuzzy AHP models for prioritization of watersheds.
Soft Comput., 2019

Monthly long-term rainfall estimation in Central India using M5Tree, MARS, LSSVR, ANN and GEP models.
Neural Comput. Appl., 2019

Chebyshev chaotic map-based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography.
Secur. Priv., 2018

Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle.
Int. J. Netw. Secur., 2018

Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs.
IET Networks, 2018

An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP.
Informatica, 2017