Follow
Dr. Neeraj Kumar, SMIEEE
Dr. Neeraj Kumar, SMIEEE
Dean DCT, Thapar Institute of Engineering and Technology, India
Verified email at thapar.edu
Title
Cited by
Cited by
Year
A survey on privacy protection in blockchain system
Q Feng, D He, S Zeadally, MK Khan, N Kumar
Journal of network and computer applications 126, 45-58, 2019
8452019
Blockchain for industry 4.0: A comprehensive review
U Bodkhe, S Tanwar, K Parekh, P Khanpara, S Tyagi, N Kumar, M Alazab
IEEE Access 8, 79764-79800, 2020
7072020
Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges
S Aggarwal, N Kumar
Computer communications 149, 270-299, 2020
6582020
Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges
NK Ishan Mistry, Sudeep Tanwar, Sudhanshu Tyagi
Mechanical Systems and Signal Processing 135, 106382, 2019
617*2019
A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks
S Tyagi, N Kumar
Journal of Network and Computer Applications 36 (2), 623-645, 2013
5642013
Decision tree and SVM-based data analytics for theft detection in smart grid
A Jindal, A Dua, K Kaur, M Singh, N Kumar, S Mishra
IEEE Transactions on Industrial Informatics 12 (3), 1005-1016, 2016
5242016
Fog computing for Healthcare 4.0 environment: Opportunities and challenges
A Kumari, S Tanwar, S Tyagi, N Kumar
Computers & Electrical Engineering 72, 1-13, 2018
5122018
Anonymous authentication for wireless body area networks with provable security
D He, S Zeadally, N Kumar, JH Lee
IEEE Systems Journal 11 (4), 2590-2601, 2016
4722016
Secure signature-based authenticated key establishment scheme for future IoT applications
S Challa, M Wazid, AK Das, N Kumar, AG Reddy, EJ Yoon, KY Yoo
Ieee Access 5, 3028-3043, 2017
4432017
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey
S Shi, D He, L Li, N Kumar, MK Khan, KKR Choo
Computers & security 97, 101966, 2020
4002020
Design of secure user authenticated key management protocol for generic IoT networks
M Wazid, AK Das, V Odelu, N Kumar, M Conti, M Jo
IEEE Internet of Things Journal 5 (1), 269-282, 2017
3992017
Edge computing in the industrial internet of things environment: Software-defined-networks-based edge-cloud interplay
K Kaur, S Garg, GS Aujla, N Kumar, JJPC Rodrigues, M Guizani
IEEE communications magazine 56 (2), 44-51, 2018
3792018
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D He, N Kumar, J Chen, CC Lee, N Chilamkurti, SS Yeo
Multimedia Systems 21, 49-60, 2015
3572015
A systematic review on routing protocols for vehicular ad hoc networks
A Dua, N Kumar, S Bawa
Vehicular Communications 1 (1), 33-52, 2014
3572014
Secure remote user authenticated key establishment protocol for smart home environment
M Wazid, AK Das, V Odelu, N Kumar, W Susilo
IEEE Transactions on Dependable and Secure Computing 17 (2), 391-406, 2017
3452017
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
R Amin, N Kumar, GP Biswas, R Iqbal, V Chang
Future Generation Computer Systems 78, 1005-1019, 2018
3422018
Blockchain for smart communities: Applications, challenges and opportunities
S Aggarwal, R Chaudhary, GS Aujla, N Kumar, KKR Choo, AY Zomaya
Journal of Network and Computer Applications 144, 13-48, 2019
3332019
Blockchain for IoT-based healthcare: background, consensus, platforms, and use cases
PP Ray, D Dash, K Salah, N Kumar
IEEE Systems Journal 15 (1), 85-94, 2020
3312020
Security and privacy for the internet of drones: Challenges and solutions
C Lin, D He, N Kumar, KKR Choo, A Vinel, X Huang
IEEE Communications Magazine 56 (1), 64-69, 2018
3302018
A robust and anonymous patient monitoring system using wireless medical sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, N Kumar
Future Generation Computer Systems 80, 483-495, 2018
3232018
The system can't perform the operation now. Try again later.
Articles 1–20