Nishant Doshi
Nishant Doshi
Pandit Deendayal Petroleum University, Gandhinagar
Verified email at
TitleCited byYear
Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext
N Doshi, D Jinwala
International Conference on Advanced Computing, Networking and Security, 515-523, 2011
Fully secure ciphertext policy attribute‐based encryption with constant length ciphertext and faster decryption
N Doshi, DC Jinwala
Security and Communication Networks 7 (11), 1988-2002, 2014
An analytical study of biometric based remote user authentication schemes using smart cards
T Limbasiya, N Doshi
Computers & Electrical Engineering 59, 305-321, 2017
Updating attribute in CP-ABE: A New Approach.
N Doshi, D Jinwala
IACR Cryptology ePrint Archive 2012, 496, 2012
Constant ciphertext length in multi-authority ciphertext policy attribute based encryption
N Doshi, D Jinwala
2011 2nd International Conference on Computer and Communication Technology …, 2011
Improving security in multi authority attribute based encryption with fast decryption
N Gorasia, RR Srikanth, N Doshi, J Rupareliya
Procedia Computer Science 79, 632-639, 2016
A password based authentication scheme for wireless multimedia systems
N Doshi, S Kumari, D Mishra, X Li, KKR Choo, AK Sangaiah
Multimedia Tools and Applications 76 (24), 25893-25918, 2017
A survey on attacks in remote user authentication scheme
T Limbasiya, N Doshi
2014 IEEE International Conference on Computational Intelligence and …, 2014
AB-OR: Improving the Efficiency in Onion Routing Using Attribute Based Cryptography
N Doshi, D Jinwala
Computer Networks & Communications (NetCom), 425-432, 2013
Security Challenges in IoT Cyber World
C Patel, N Doshi
Security in Smart Cities: Models, Applications, and Challenges, 171-191, 2019
An efficient approach for privacy preserving distributed mining of association rules in unsecured environment
CN Modi, AR Patil, N Doshi
2015 International Conference on Advances in Computing, Communications and …, 2015
A Novel Approach for Matrix Chain Multiplication Using Greedy Technique for Packet Processing
H Nimbark, S Gohel, N Doshi
International Conference on Advances in Communication, Network, and …, 2011
A secure email login system using virtual password
B Tanti, N Doshi
arXiv preprint arXiv:1009.5729, 2010
Width of a Binary Tree
N Doshi, T Sureja, B Akbari, H Savaliya, V Daxini
International Journal of Computer Applications 9 (2), 2010
Hamiltonian cycle and TSP: A backtracking approach
D Patel, N Doshi, S Patel, D Soni
International Journal on Computer Science and Engineering 3 (4), 1413-1417, 2011
Width of a General Tree for Packet Routing
H Nimbark, S Gohel, N Doshi
International Conference on Advances in Communication, Network, and …, 2011
Using Ciphertext Policy Attribute Based Encryption for Verifiable Secret Sharing
N Doshi, D Jinwala
Proceedings of the International Conference on Security and Management (SAM), 1, 2011
Internet of Things Security: Challenges, Advances, and Analytics
C Patel, N Doshi
Auerbach Publications, 2018
An Improve Three Factor Remote User Authentication Scheme Using Smart Card
M Shingala, C Patel, N Doshi
Wireless Personal Communications 99 (1), 227-251, 2018
Securing Personal Health Records in the Cloud by Using Attribute Based Encryption. A Review
M Oza, N Gorasiya, N Doshi
Grin Publisher, Verlag, Germany, 2016
The system can't perform the operation now. Try again later.
Articles 1–20