Nishant Doshi
Nishant Doshi
Pandit Deendayal Petroleum University, Gandhinagar
Verified email at acm.org
Title
Cited by
Cited by
Year
Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext
N Doshi, D Jinwala
International Conference on Advanced Computing, Networking and Security, 515-523, 2011
382011
Fully secure ciphertext policy attribute‐based encryption with constant length ciphertext and faster decryption
N Doshi, DC Jinwala
Security and Communication Networks 7 (11), 1988-2002, 2014
272014
An analytical study of biometric based remote user authentication schemes using smart cards
T Limbasiya, N Doshi
Computers & Electrical Engineering 59, 305-321, 2017
162017
Improving security in multi authority attribute based encryption with fast decryption
N Gorasia, RR Srikanth, N Doshi, J Rupareliya
Procedia Computer Science 79, 632-639, 2016
112016
Constant ciphertext length in multi-authority ciphertext policy attribute based encryption
N Doshi, D Jinwala
2011 2nd International Conference on Computer and Communication Technology …, 2011
102011
Updating attribute in CP-ABE: A New Approach.
N Doshi, D Jinwala
IACR Cryptology ePrint Archive 2012, 496, 2012
92012
A password based authentication scheme for wireless multimedia systems
N Doshi, S Kumari, D Mishra, X Li, KKR Choo, AK Sangaiah
Multimedia Tools and Applications 76 (24), 25893-25918, 2017
82017
Methods And Systems For Intelligent Utilization Of Off-Peak Network Bandwidth
N Doshi, S Auger, A Sharma
US Patent App. 14/950,962, 2017
52017
Systems and methods for determining that uniform resource locators are malicious
N Doshi, S Satish
US Patent 9,083,729, 2015
52015
A survey on attacks in remote user authentication scheme
T Limbasiya, N Doshi
2014 IEEE International Conference on Computational Intelligence and …, 2014
52014
AB-OR: Improving the Efficiency in Onion Routing Using Attribute Based Cryptography
N Doshi, D Jinwala
Computer Networks & Communications (NetCom), 425-432, 2013
52013
Security Challenges in IoT Cyber World
C Patel, N Doshi
Security in Smart Cities: Models, Applications, and Challenges, 171-191, 2019
32019
Single sign on proxy for regulating access to a cloud service
N Doshi
US Patent 9,807,079, 2017
32017
An efficient approach for privacy preserving distributed mining of association rules in unsecured environment
CN Modi, AR Patil, N Doshi
2015 International Conference on Advances in Computing, Communications and …, 2015
32015
Systems and methods for preventing unauthorized modification of network resources
S Satish, N Doshi
US Patent 8,627,407, 2014
32014
A novel approach for matrix chain multiplication using greedy technique for packet processing
H Nimbark, S Gohel, N Doshi
International Conference on Advances in Communication, Network, and …, 2011
32011
A secure email login system using virtual password
B Tanti, N Doshi
arXiv preprint arXiv:1009.5729, 2010
32010
Width of a Binary Tree
N Doshi, T Sureja, B Akbari, H Savaliya, V Daxini
International Journal of Computer Applications 9 (2), 2010
32010
Social implications of smart cities
Y Patel, N Doshi
Procedia Computer Science 155, 692-697, 2019
22019
A Novel Approach for Biometric Based Remote User Authentication Scheme using Smart Card
N Doshi, C Patel
2018 International Conference on Advances in Computing, Communications and …, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20