Follow
Dr. Neeraj Kumar, SMIEEE (Web of Science Highly Cited Researcher 2019, 2020,2021)
Dr. Neeraj Kumar, SMIEEE (Web of Science Highly Cited Researcher 2019, 2020,2021)
Professor, CSED, Thapar Institute of Engineering and Technology, India
Verified email at thapar.edu
Title
Cited by
Cited by
Year
A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks
S Tyagi, N Kumar
Journal of Network and Computer Applications 36 (2), 623-645, 2013
4892013
A survey on privacy protection in blockchain system
Q Feng, D He, S Zeadally, MK Khan, N Kumar
Journal of Network and Computer Applications 126, 45-58, 2019
4702019
Anonymous authentication for wireless body area networks with provable security
D He, S Zeadally, N Kumar, JH Lee
IEEE Systems Journal 11 (4), 2590-2601, 2016
3932016
Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges
I Mistry, S Tanwar, S Tyagi, N Kumar
Mechanical systems and signal processing 135, 106382, 2020
3642020
Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges
NK Ishan Mistry, Sudeep Tanwar, Sudhanshu Tyagi
Mechanical Systems and Signal Processing 135, 106382, 2019
364*2019
Decision tree and SVM-based data analytics for theft detection in smart grid
A Jindal, A Dua, K Kaur, M Singh, N Kumar, S Mishra
IEEE Transactions on Industrial Informatics 12 (3), 1005-1016, 2016
3512016
Fog computing for Healthcare 4.0 environment: Opportunities and challenges
A Kumari, S Tanwar, S Tyagi, N Kumar
Computers & Electrical Engineering 72, 1-13, 2018
3492018
Secure signature-based authenticated key establishment scheme for future IoT applications
S Challa, M Wazid, AK Das, N Kumar, AG Reddy, EJ Yoon, KY Yoo
Ieee Access 5, 3028-3043, 2017
3162017
A systematic review on routing protocols for vehicular ad hoc networks
A Dua, N Kumar, S Bawa
Vehicular Communications 1 (1), 33-52, 2014
3142014
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D He, N Kumar, J Chen, CC Lee, N Chilamkurti, SS Yeo
Multimedia Systems 21 (1), 49-60, 2015
2912015
Edge computing in the industrial internet of things environment: Software-defined-networks-based edge-cloud interplay
K Kaur, S Garg, GS Aujla, N Kumar, JJPC Rodrigues, M Guizani
IEEE communications magazine 56 (2), 44-51, 2018
2852018
Design of secure user authenticated key management protocol for generic IoT networks
M Wazid, AK Das, V Odelu, N Kumar, M Conti, M Jo
IEEE Internet of Things Journal 5 (1), 269-282, 2017
2812017
Blockchain for industry 4.0: A comprehensive review
U Bodkhe, S Tanwar, K Parekh, P Khanpara, S Tyagi, N Kumar, M Alazab
IEEE Access 8, 79764-79800, 2020
2672020
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
R Amin, N Kumar, GP Biswas, R Iqbal, V Chang
Future Generation Computer Systems 78, 1005-1019, 2018
2562018
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D He, N Kumar, N Chilamkurti
Information Sciences 321, 263-277, 2015
2502015
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, L Leng, N Kumar
Computer Networks 101, 42-62, 2016
2252016
Blockchain for smart communities: Applications, challenges and opportunities
S Aggarwal, R Chaudhary, GS Aujla, N Kumar, KKR Choo, AY Zomaya
Journal of Network and Computer Applications 144, 13-48, 2019
2242019
Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges
S Aggarwal, N Kumar
Computer Communications 149, 270-299, 2020
2222020
A robust and anonymous patient monitoring system using wireless medical sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, N Kumar
Future Generation Computer Systems 80, 483-495, 2018
2222018
Secure remote user authenticated key establishment protocol for smart home environment
M Wazid, AK Das, V Odelu, N Kumar, W Susilo
IEEE Transactions on Dependable and Secure Computing 17 (2), 391-406, 2017
2222017
The system can't perform the operation now. Try again later.
Articles 1–20