Dr. Neeraj Kumar, SMIEEE, MIES
Dr. Neeraj Kumar, SMIEEE, MIES
Professor, CSED, Thapar Institute of Engineering and Technology, India
Verified email at thapar.edu
Title
Cited by
Cited by
Year
A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks
S Tyagi, N Kumar
Journal of Network and Computer Applications 36 (2), 623-645, 2013
4112013
Anonymous authentication for wireless body area networks with provable security
D He, S Zeadally, N Kumar, JH Lee
IEEE Systems Journal 11 (4), 2590-2601, 2016
3052016
A systematic review on routing protocols for vehicular ad hoc networks
A Dua, N Kumar, S Bawa
Vehicular Communications 1 (1), 33-52, 2014
2672014
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D He, N Kumar, J Chen, CC Lee, N Chilamkurti, SS Yeo
Multimedia Systems 21 (1), 49-60, 2015
2232015
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D He, N Kumar, N Chilamkurti
Information Sciences 321, 263-277, 2015
2082015
Decision tree and SVM-based data analytics for theft detection in smart grid
A Jindal, A Dua, K Kaur, M Singh, N Kumar, S Mishra
IEEE Transactions on Industrial Informatics 12 (3), 1005-1016, 2016
1772016
Fog computing for Healthcare 4.0 environment: Opportunities and challenges
A Kumari, S Tanwar, S Tyagi, N Kumar
Computers & Electrical Engineering 72, 1-13, 2018
1712018
A survey on privacy protection in blockchain system
Q Feng, D He, S Zeadally, MK Khan, N Kumar
Journal of Network and Computer Applications 126, 45-58, 2019
1642019
Clustering in vehicular ad hoc networks: taxonomy, challenges and solutions
RS Bali, N Kumar, JJPC Rodrigues
Vehicular communications 1 (3), 134-152, 2014
1642014
Secure signature-based authenticated key establishment scheme for future IoT applications
S Challa, M Wazid, AK Das, N Kumar, AG Reddy, EJ Yoon, KY Yoo
IEEE Access 5, 3028-3043, 2017
1622017
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, L Leng, N Kumar
Computer Networks 101, 42-62, 2016
1492016
Enhanced three-factor security protocol for consumer USB mass storage devices
D He, N Kumar, JH Lee, RS Sherratt
IEEE Transactions on Consumer Electronics 60 (1), 30-37, 2014
1432014
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
R Amin, N Kumar, GP Biswas, R Iqbal, V Chang
Future Generation Computer Systems 78, 1005-1019, 2018
1422018
A robust and anonymous patient monitoring system using wireless medical sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, N Kumar
Future Generation Computer Systems 80, 483-495, 2018
1382018
Design of secure user authenticated key management protocol for generic IoT networks
M Wazid, AK Das, V Odelu, N Kumar, M Conti, M Jo
IEEE Internet of Things Journal 5 (1), 269-282, 2017
1382017
Edge computing in the industrial internet of things environment: Software-defined-networks-based edge-cloud interplay
K Kaur, S Garg, GS Aujla, N Kumar, JJPC Rodrigues, M Guizani
IEEE communications magazine 56 (2), 44-51, 2018
1312018
A systematic review on heterogeneous routing protocols for wireless sensor network
S Tanwar, N Kumar, JJPC Rodrigues
Journal of network and computer applications 53, 39-56, 2015
1232015
Vehicular delay-tolerant networks for smart grid data management using mobile edge computing
N Kumar, S Zeadally, JJPC Rodrigues
IEEE Communications Magazine 54 (10), 60-66, 2016
1172016
Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures
D He, S Zeadally, N Kumar, W Wu
IEEE Transactions on Information Forensics and Security 11 (9), 2052-2064, 2016
1162016
Fog vehicular computing: Augmentation of fog computing using vehicular cloud computing
M Sookhak, FR Yu, Y He, H Talebian, NS Safa, N Zhao, MK Khan, ...
IEEE Vehicular Technology Magazine 12 (3), 55-64, 2017
1092017
The system can't perform the operation now. Try again later.
Articles 1–20