Udai Pratap Rao

Orcid: 0000-0002-2372-4138

According to our database1, Udai Pratap Rao authored at least 40 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PGASH: Provable group-based authentication scheme for Internet of Healthcare Things.
Peer Peer Netw. Appl., March, 2024

2023
Performance Evaluation of RPL Protocol Under Decreased and Increased Rank Attacks: A Focus on Smart Home Use-Case.
SN Comput. Sci., July, 2023

Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare.
Peer Peer Netw. Appl., May, 2023

Privacy-preserving enhanced dummy-generation technique for location-based services.
Concurr. Comput. Pract. Exp., January, 2023

Secrecy aware key management scheme for Internet of Healthcare Things.
J. Supercomput., 2023

A transformative shift toward blockchain-based IoT environments: Consensus, smart contracts, and future directions.
Secur. Priv., 2023

A review on cloud security issues and solutions.
J. Comput. Secur., 2023

A discovery and selection protocol for decentralised cloudlet systems.
Int. J. Cloud Comput., 2023

Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey.
ACM Comput. Surv., 2023

2022
Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices.
J. Supercomput., 2022

A novel defense mechanism to protect users from profile cloning attack on Online Social Networks (OSNs).
Peer-to-Peer Netw. Appl., 2022

EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things.
Peer-to-Peer Netw. Appl., 2022

Improved <i>l</i>-diversity: Scalable anonymization approach for Privacy Preserving Big Data Publishing.
J. King Saud Univ. Comput. Inf. Sci., 2022

Multi-Objective Energy-Efficient Virtual Machine Consolidation Using Dynamic Double Threshold-Enhanced Search and Rescue-Based Optimization.
Int. J. Softw. Sci. Comput. Intell., 2022

Multi-Objective Adaptive Manta-Ray Foraging Optimization for Workflow Scheduling with Selected Virtual Machines Using Time-Series-Based Prediction.
Int. J. Softw. Sci. Comput. Intell., 2022

An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions.
Comput. Secur., 2022

A novel trust prediction approach for online social networks based on multifaceted feature similarity.
Clust. Comput., 2022

User behavior-based and graph-based hybrid approach for detection of Sybil Attack in online social networks.
Comput. Electr. Eng., 2022

User Authentication using Behavioural Biometrics with Machine Learning.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2022

2021
A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case.
J. Supercomput., 2021

Privacy Preserving Association Rule Mining on Distributed Healthcare Data: COVID-19 and Breast Cancer Case Study.
SN Comput. Sci., 2021

Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining.
Computing, 2021

2020
Preserving location privacy using three layer RDV masking in geocoded published discrete point data.
World Wide Web, 2020

Dummy Generation-Based Privacy Preservation for Location-Based Services.
Proceedings of the ICDCN 2020: 21st International Conference on Distributed Computing and Networking, 2020

2019
VIC-PRO: Vicinity Protection by Concealing Location Coordinates Using Geometrical Transformations in Location Based Services.
Wirel. Pers. Commun., 2019

Towards privacy preserving unstructured big data publishing.
J. Intell. Fuzzy Syst., 2019

Scalable l-Diversity: An Extension to Scalable k-Anonymity for Privacy Preserving Big Data Publishing.
Int. J. Inf. Technol. Web Eng., 2019

SCC-LBS: Secure Criss-Cross Location-Based Service in Logistics.
Proceedings of the 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication, 2019

A Scalable ($\alpha, k$)-Anonymization Approach using MapReduce for Privacy Preserving Big Data Publishing.
Proceedings of the 10th International Conference on Computing, 2019

2018
Privacy Preserving Approach for Association Rule Mining in Horizontally Partitioned Data using MFI and Shamir's Secret Sharing.
Proceedings of the 13th IEEE International Conference on Industrial and Information Systems, 2018

2017
An Exploration to Location Based Service and Its Privacy Preserving Techniques: A Survey.
Wirel. Pers. Commun., 2017

A Hybrid Location Privacy Solution for Mobile LBS.
Mob. Inf. Syst., 2017

Achieving location privacy through CAST in location based services.
J. Commun. Networks, 2017

Weighted Role Based Data Dependency Approach for Intrusion Detection in Database.
Int. J. Netw. Secur., 2017

Privacy preserving big data publishing: a scalable <i>k</i>-anonymization approach using MapReduce.
IET Softw., 2017

2016
Discovery and selection mechanism of cloudlets in a decentralized MCC environment.
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016

2014
A Novel approach as Multi-place Watermarking for Security in Database.
CoRR, 2014

2013
Incorporation of Application Specific Information for Recovery in Database from Malicious Transactions.
Inf. Secur. J. A Glob. Perspect., 2013

2010
An Efficient Approach for Preventing Disclosure of Sensitive Association Rules in Databases.
Proceedings of the 2010 International Conference on Information & Knowledge Engineering, 2010

A Survey on Preserving Privacy for Sensitive Association Rules in Databases.
Proceedings of the Information Processing and Management, 2010


  Loading...