Dr. Neeraj Kumar, SMIEEE, MIES
Dr. Neeraj Kumar, SMIEEE, MIES
Professor, CSED, Thapar Institute of Engineering and Technology, India
E-mail confirmado em thapar.edu
Título
Citado por
Citado por
Ano
A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks
S Tyagi, N Kumar
Journal of Network and Computer Applications 36 (2), 623-645, 2013
4192013
Anonymous authentication for wireless body area networks with provable security
D He, S Zeadally, N Kumar, JH Lee
IEEE Systems Journal 11 (4), 2590-2601, 2016
3242016
A systematic review on routing protocols for vehicular ad hoc networks
A Dua, N Kumar, S Bawa
Vehicular Communications 1 (1), 33-52, 2014
2752014
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D He, N Kumar, J Chen, CC Lee, N Chilamkurti, SS Yeo
Multimedia Systems 21 (1), 49-60, 2015
2282015
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D He, N Kumar, N Chilamkurti
Information Sciences 321, 263-277, 2015
2132015
A survey on privacy protection in blockchain system
Q Feng, D He, S Zeadally, MK Khan, N Kumar
Journal of Network and Computer Applications 126, 45-58, 2019
2092019
Decision tree and SVM-based data analytics for theft detection in smart grid
A Jindal, A Dua, K Kaur, M Singh, N Kumar, S Mishra
IEEE Transactions on Industrial Informatics 12 (3), 1005-1016, 2016
1972016
Fog computing for Healthcare 4.0 environment: Opportunities and challenges
A Kumari, S Tanwar, S Tyagi, N Kumar
Computers & Electrical Engineering 72, 1-13, 2018
1902018
Secure signature-based authenticated key establishment scheme for future IoT applications
S Challa, M Wazid, AK Das, N Kumar, AG Reddy, EJ Yoon, KY Yoo
IEEE Access 5, 3028-3043, 2017
1842017
Clustering in vehicular ad hoc networks: taxonomy, challenges and solutions
RS Bali, N Kumar, JJPC Rodrigues
Vehicular communications 1 (3), 134-152, 2014
1742014
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, L Leng, N Kumar
Computer Networks 101, 42-62, 2016
1602016
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
R Amin, N Kumar, GP Biswas, R Iqbal, V Chang
Future Generation Computer Systems 78, 1005-1019, 2018
1592018
Edge computing in the industrial internet of things environment: Software-defined-networks-based edge-cloud interplay
K Kaur, S Garg, GS Aujla, N Kumar, JJPC Rodrigues, M Guizani
IEEE communications magazine 56 (2), 44-51, 2018
1572018
Design of secure user authenticated key management protocol for generic IoT networks
M Wazid, AK Das, V Odelu, N Kumar, M Conti, M Jo
IEEE Internet of Things Journal 5 (1), 269-282, 2017
1562017
Enhanced three-factor security protocol for consumer USB mass storage devices
D He, N Kumar, JH Lee, RS Sherratt
IEEE Transactions on Consumer Electronics 60 (1), 30-37, 2014
1552014
A robust and anonymous patient monitoring system using wireless medical sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, N Kumar
Future Generation Computer Systems 80, 483-495, 2018
1462018
Vehicular delay-tolerant networks for smart grid data management using mobile edge computing
N Kumar, S Zeadally, JJPC Rodrigues
IEEE Communications Magazine 54 (10), 60-66, 2016
1312016
Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges
I Mistry, S Tanwar, S Tyagi, N Kumar
Mechanical Systems and Signal Processing 135, 106382, 2020
1302020
Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges
NK Ishan Mistry, Sudeep Tanwar, Sudhanshu Tyagi
Mechanical Systems and Signal Processing 135, 106382, 2019
130*2019
A systematic review on heterogeneous routing protocols for wireless sensor network
S Tanwar, N Kumar, JJPC Rodrigues
Journal of network and computer applications 53, 39-56, 2015
1262015
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20