Follow
Kaushal Shah
Kaushal Shah
Assistant Professor, Pandit Deendayal Energy University
Verified email at coed.svnit.ac.in
Title
Cited by
Cited by
Year
A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS
C Lepore, M Ceria, A Visconti, UP Rao, KA Shah, L Zanolini
Mathematics 8 (10), 1782, 2020
1022020
An improved secure key generation using enhanced identity-based encryption for cloud computing in large-scale 5G
RK Gupta, KK Almuzaini, RK Pateriya, K Shah, PK Shukla, R Akwafo
Wireless Communications and Mobile Computing 2022, 1-14, 2022
402022
Exploring applications of blockchain technology for Industry 4.0
K Shah, N Patel, J Thakkar, C Patel
Materials Today: Proceedings 62, 7238-7242, 2022
232022
Privacy preserving, verifiable and resilient data aggregation in grid-based networks
KA Shah, DC Jinwala
The Computer Journal 61 (4), 614-628, 2018
222018
Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks
K Shah, D Jinwala
Frontiers of Computer Science 15 (6), 156813, 2021
212021
A review on blockchain technology: Components, issues and challenges
V Patel, F Khatiwala, K Shah, Y Choksi
ICDSMLA 2019: Proceedings of the 1st International Conference on Data …, 2020
172020
Novel approach for pre-distributing keys in WSNs for linear infrastructure
KA Shah, DC Jinwala
Wireless Personal Communications 95, 3905-3921, 2017
132017
A secure expansive aggregation in wireless sensor networks for linear infrasturcture
K Shah, DC Jinwala
2016 IEEE Region 10 Symposium (TENSYMP), 207-212, 2016
132016
Machine-learning techniques for predicting phishing attacks in blockchain networks: A comparative study
K Joshi, C Bhatt, K Shah, D Parmar, JM Corchado, A Bruno, PL Mazzeo
Algorithms 16 (8), 366, 2023
102023
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR NETWORKS
K Shah, DC Jinwala
Computer Science & Information Technology (Cryptography and Information …, 2018
102018
Exploring security threats on blockchain technology along with possible remedies
S Sharma, K Shah
2022 IEEE 7th International conference for Convergence in Technology (I2CT), 1-4, 2022
72022
Privacy-preserving e-voting system through blockchain technology
J Thakkar, N Patel, C Patel, K Shah
2021 IEEE International Conference on Technology, Research, and Innovation …, 2021
72021
DAMBNFT: Document Authentication Model through Blockchain and Non-fungible Tokens
U Khokhariya, K Shah, N Pancholi, S Kumar
Smart Trends in Computing and Communications: Proceedings of SmartCom 2022, 347, 2022
62022
Novel approach of key predistribution for grid based sensor networks
KA Shah, DC Jinwala
Wireless Personal Communications 108, 939-955, 2019
62019
Exploring the access control policies of web-based social network
K Shah, D Patel
ICDSMLA 2019: Proceedings of the 1st International Conference on Data …, 2020
42020
A systematic review of decentralized finance protocols
K Shah, D Lathiya, N Lukhi, K Parmar, H Sanghvi
International Journal of Intelligent Networks, 2023
32023
Securing cookies/sessions through non-fungible tokens
K Shah, U Khokhariya, N Pancholi, S Kumar, K Parmar
international conference on database systems for advanced applications, 135-146, 2022
32022
An exploration to the quantum cryptography technology
H Jasoliya, K Shah
2022 9th International Conference on Computing for Sustainable Global …, 2022
32022
IoT Forensics System based on Blockchain
Y Makadiya, R Virparia, K Shah
2023 10th International Conference on Computing for Sustainable Global …, 2023
22023
Blockchain-enabled Dynamic Document Ownership Verification
D Lathiya, N Lukhi, K Shah
2023 10th International Conference on Computing for Sustainable Global …, 2023
22023
The system can't perform the operation now. Try again later.
Articles 1–20