Dr. Neeraj Kumar, SMIEEE, MIES
Dr. Neeraj Kumar, SMIEEE, MIES
Professor, CSED, Thapar Institute of Engineering and Technology, India
Verified email at thapar.edu
Cited by
Cited by
A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks
S Tyagi, N Kumar
Journal of Network and Computer Applications 36 (2), 623-645, 2013
Anonymous authentication for wireless body area networks with provable security
D He, S Zeadally, N Kumar, JH Lee
IEEE Systems Journal 11 (4), 2590-2601, 2016
A systematic review on routing protocols for vehicular ad hoc networks
A Dua, N Kumar, S Bawa
Vehicular Communications 1 (1), 33-52, 2014
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D He, N Kumar, J Chen, CC Lee, N Chilamkurti, SS Yeo
Multimedia Systems 21 (1), 49-60, 2015
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D He, N Kumar, N Chilamkurti
Information Sciences 321, 263-277, 2015
Decision tree and SVM-based data analytics for theft detection in smart grid
A Jindal, A Dua, K Kaur, M Singh, N Kumar, S Mishra
IEEE Transactions on Industrial Informatics 12 (3), 1005-1016, 2016
A survey on privacy protection in blockchain system
Q Feng, D He, S Zeadally, MK Khan, N Kumar
Journal of Network and Computer Applications 126, 45-58, 2019
Fog computing for Healthcare 4.0 environment: Opportunities and challenges
A Kumari, S Tanwar, S Tyagi, N Kumar
Computers & Electrical Engineering 72, 1-13, 2018
Secure signature-based authenticated key establishment scheme for future IoT applications
S Challa, M Wazid, AK Das, N Kumar, AG Reddy, EJ Yoon, KY Yoo
IEEE Access 5, 3028-3043, 2017
Clustering in vehicular ad hoc networks: taxonomy, challenges and solutions
RS Bali, N Kumar, JJPC Rodrigues
Vehicular communications 1 (3), 134-152, 2014
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, L Leng, N Kumar
Computer Networks 101, 42-62, 2016
Enhanced three-factor security protocol for consumer USB mass storage devices
D He, N Kumar, JH Lee, RS Sherratt
IEEE Transactions on Consumer Electronics 60 (1), 30-37, 2014
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
R Amin, N Kumar, GP Biswas, R Iqbal, V Chang
Future Generation Computer Systems 78, 1005-1019, 2018
Design of secure user authenticated key management protocol for generic IoT networks
M Wazid, AK Das, V Odelu, N Kumar, M Conti, M Jo
IEEE Internet of Things Journal 5 (1), 269-282, 2017
Edge computing in the industrial internet of things environment: Software-defined-networks-based edge-cloud interplay
K Kaur, S Garg, GS Aujla, N Kumar, JJPC Rodrigues, M Guizani
IEEE communications magazine 56 (2), 44-51, 2018
A robust and anonymous patient monitoring system using wireless medical sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, N Kumar
Future Generation Computer Systems 80, 483-495, 2018
A systematic review on heterogeneous routing protocols for wireless sensor network
S Tanwar, N Kumar, JJPC Rodrigues
Journal of network and computer applications 53, 39-56, 2015
Vehicular delay-tolerant networks for smart grid data management using mobile edge computing
N Kumar, S Zeadally, JJPC Rodrigues
IEEE Communications Magazine 54 (10), 60-66, 2016
Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures
D He, S Zeadally, N Kumar, W Wu
IEEE Transactions on Information Forensics and Security 11 (9), 2052-2064, 2016
Container-as-a-service at the edge: Trade-off between energy efficiency and service availability at fog nano data centers
K Kaur, T Dhand, N Kumar, S Zeadally
IEEE wireless communications 24 (3), 48-56, 2017
The system can't perform the operation now. Try again later.
Articles 1–20