Follow
Gaurav Sharma
Gaurav Sharma
Université libre de Bruxelles
Verified email at ulb.be - Homepage
Title
Cited by
Cited by
Year
Security Frameworks for Wireless Sensor Networks-Review
G Sharma, S Bala, AK Verma
Procedia Technology 6, 978-987, 2012
1022012
A study of position based VANET routing protocols
N Goel, G Sharma, I Dhyani
2016 International Conference on Computing, Communication and Automation …, 2016
482016
Towards a Secure Incremental Proxy Re-encryption for E-healthcare Data Sharing in Mobile Cloud Computing
T Bhatia, AK Verma, G Sharma
Concurrency and Computation: Practice and Experience 32 (5), 2020
472020
An Energy Efficient And Trust Aware Framework For Secure Routing In Leach For Wireless Sensor Networks
A Miglani, T Bhatia, G Sharma, G Shrivastava
Scalable Computing: Practice and Experience 18 (3), 217-228, 2017
342017
An Improved RSA-based Certificateless Signature Scheme for Wireless Sensor Networks.
G Sharma, S Bala, AK Verma
International Journal of Network Security 18 (1), 82-89, 2016
312016
PF-ID-2PAKA: Pairing Free Identity-Based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks
S Bala, G Sharma, AK Verma
Wireless Personal Communications 87 (3), 995-1012, 2016
302016
Artificial Intelligence Based Intrusion Detection System to Detect Flooding Attack in VANETs
MJS Aneja, T Bhatia, G Sharma, G Shrivastava
Handbook of Research on Network Forensics and Analysis Techniques, 87-100, 2018
272018
A Reliable Tactic for Detecting Black Hole Attack in Vehicular Ad Hoc Networks
I Dhyani, N Goel, G Sharma, B Mallick
International Conference on Computer, Communication and Computational …, 2016
252016
Classification of symmetric key management schemes for wireless sensor networks
S Bala, G Sharma, AK Verma
International Journal of Security and Its Applications 7 (2), 117-138, 2013
252013
PF-IBS: Pairing-Free Identity Based digital Signature Algorithm for Wireless Sensor Networks
G Sharma, S Bala, AK Verma
Wireless Personal Communications 97 (2017), 1185–1196, 2017
222017
Security in wireless sensor networks using frequency hopping
G Sharma, S Bala, AK Verma, T Singh
International Journal of Computer Applications 12 (6), 1-6, 2010
212010
Secure sharing of mobile personal healthcare records using certificateless proxy re‐encryption in cloud
T Bhatia, AK Verma, G Sharma
Transactions on Emerging Telecommunications Technologies 29 (6), e3309, 2018
192018
ROUTING IN WIRELESS SENSOR NETWORKS
G Sharma
ROUTING IN WIRELESS SENSOR NETWORKS, 2009
192009
SSPSoC: A Secure SDN-Based Protocol over MPSoC
S Ellinidou, G Sharma, T Rigas, T Vanspouwen, O Markowitch, JM Dricot
Security and Communication Networks 2019, 11, 2019
172019
Impersonation Attack on CertificateLess Key Agreement Protocol
S Bala, G Sharma, AK Verma
International Journal of Ad Hoc and Ubiquitous Computing 27 (2), 108-120, 2018
172018
Comparison of flooding and directed diffusion for wireless sensor network
G Sharma, S Bala, AK Verma
India Conference (INDICON), 2009 Annual IEEE, 1-4, 2009
162009
A twofold group key agreement protocol for NoC-based MPSoCs
G Sharma, V Kuchta, RA Sahu, S Ellinidou, S Bala, O Markowitch, ...
Transactions on Emerging Telecommunications Technologies 30 (6), 2019
152019
An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks
S Bala, G Sharma, AK Verma
International Conference on IT Convergence and Security 2012, PyeongChang …, 2012
152012
Pairing-Free Certificateless Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor Networks
G Sharma, S Bala, AK Verma
Wireless Personal Communications 84 (2), 1469-1485, 2015
142015
A survey and taxonomy of symmetric key management schemes for wireless sensor networks
S Bala, G Sharma, AK Verma
CUBE International Information Technology Conference, Pune, India, Sep 03-05 …, 2012
142012
The system can't perform the operation now. Try again later.
Articles 1–20