Nishant Doshi
Nishant Doshi
Pandit Deendayal Petroleum University, Gandhinagar
Verified email at
Cited by
Cited by
Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext
N Doshi, D Jinwala
International Conference on Advanced Computing, Networking and Security, 515-523, 2011
Fully secure ciphertext policy attribute‐based encryption with constant length ciphertext and faster decryption
N Doshi, DC Jinwala
Security and Communication Networks 7 (11), 1988-2002, 2014
An analytical study of biometric based remote user authentication schemes using smart cards
T Limbasiya, N Doshi
Computers & Electrical Engineering 59, 305-321, 2017
Improving security in multi authority attribute based encryption with fast decryption
N Gorasia, RR Srikanth, N Doshi, J Rupareliya
Procedia Computer Science 79, 632-639, 2016
Constant ciphertext length in multi-authority ciphertext policy attribute based encryption
N Doshi, D Jinwala
2011 2nd International Conference on Computer and Communication Technology …, 2011
Updating attribute in CP-ABE: A New Approach.
N Doshi, D Jinwala
IACR Cryptology ePrint Archive 2012, 496, 2012
A password based authentication scheme for wireless multimedia systems
N Doshi, S Kumari, D Mishra, X Li, KKR Choo, AK Sangaiah
Multimedia Tools and Applications 76 (24), 25893-25918, 2017
Methods And Systems For Intelligent Utilization Of Off-Peak Network Bandwidth
N Doshi, S Auger, A Sharma
US Patent App. 14/950,962, 2017
Systems and methods for determining that uniform resource locators are malicious
N Doshi, S Satish
US Patent 9,083,729, 2015
A survey on attacks in remote user authentication scheme
T Limbasiya, N Doshi
2014 IEEE International Conference on Computational Intelligence and …, 2014
AB-OR: Improving the Efficiency in Onion Routing Using Attribute Based Cryptography
N Doshi, D Jinwala
Computer Networks & Communications (NetCom), 425-432, 2013
Security Challenges in IoT Cyber World
C Patel, N Doshi
Security in Smart Cities: Models, Applications, and Challenges, 171-191, 2019
Single sign on proxy for regulating access to a cloud service
N Doshi
US Patent 9,807,079, 2017
An efficient approach for privacy preserving distributed mining of association rules in unsecured environment
CN Modi, AR Patil, N Doshi
2015 International Conference on Advances in Computing, Communications and …, 2015
Systems and methods for preventing unauthorized modification of network resources
S Satish, N Doshi
US Patent 8,627,407, 2014
A novel approach for matrix chain multiplication using greedy technique for packet processing
H Nimbark, S Gohel, N Doshi
International Conference on Advances in Communication, Network, and …, 2011
A secure email login system using virtual password
B Tanti, N Doshi
arXiv preprint arXiv:1009.5729, 2010
Width of a Binary Tree
N Doshi, T Sureja, B Akbari, H Savaliya, V Daxini
International Journal of Computer Applications 9 (2), 2010
Social implications of smart cities
Y Patel, N Doshi
Procedia Computer Science 155, 692-697, 2019
A Novel Approach for Biometric Based Remote User Authentication Scheme using Smart Card
N Doshi, C Patel
2018 International Conference on Advances in Computing, Communications and …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20