Dr. Neeraj Kumar, SMIEEE, MIES
Dr. Neeraj Kumar, SMIEEE, MIES
Full Professor, Department of Computer Science and Engineering, Thapar Institute of Engineering and
Verified email at thapar.edu
Title
Cited by
Cited by
Year
A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks
S Tyagi, N Kumar
Journal of Network and Computer Applications 36 (2), 623-645, 2013
3862013
Anonymous authentication for wireless body area networks with provable security
D He, S Zeadally, N Kumar, JH Lee
IEEE Systems Journal 11 (4), 2590-2601, 2016
2782016
A systematic review on routing protocols for vehicular ad hoc networks
A Dua, N Kumar, S Bawa
Vehicular Communications 1 (1), 33-52, 2014
2512014
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D He, N Kumar, J Chen, CC Lee, N Chilamkurti, SS Yeo
Multimedia Systems 21 (1), 49-60, 2015
2052015
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D He, N Kumar, N Chilamkurti
Information Sciences 321, 263-277, 2015
2002015
Clustering in vehicular ad hoc networks: taxonomy, challenges and solutions
RS Bali, N Kumar, JJPC Rodrigues
Vehicular communications 1 (3), 134-152, 2014
1522014
Decision tree and SVM-based data analytics for theft detection in smart grid
A Jindal, A Dua, K Kaur, M Singh, N Kumar, S Mishra
IEEE Transactions on Industrial Informatics 12 (3), 1005-1016, 2016
1432016
Secure signature-based authenticated key establishment scheme for future IoT applications
S Challa, M Wazid, AK Das, N Kumar, AG Reddy, EJ Yoon, KY Yoo
IEEE Access 5, 3028-3043, 2017
1342017
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, L Leng, N Kumar
Computer Networks 101, 42-62, 2016
1322016
Enhanced three-factor security protocol for consumer USB mass storage devices
D He, N Kumar, JH Lee, RS Sherratt
IEEE Transactions on Consumer Electronics 60 (1), 30-37, 2014
1312014
A robust and anonymous patient monitoring system using wireless medical sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, N Kumar
Future Generation Computer Systems 80, 483-495, 2018
1142018
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
R Amin, N Kumar, GP Biswas, R Iqbal, V Chang
Future Generation Computer Systems 78, 1005-1019, 2018
1142018
A systematic review on heterogeneous routing protocols for wireless sensor network
S Tanwar, N Kumar, JJPC Rodrigues
Journal of network and computer applications 53, 39-56, 2015
1132015
Design of secure user authenticated key management protocol for generic IoT networks
M Wazid, AK Das, V Odelu, N Kumar, M Conti, M Jo
IEEE Internet of Things Journal 5 (1), 269-282, 2017
1102017
A survey on privacy protection in blockchain system
Q Feng, D He, S Zeadally, MK Khan, N Kumar
Journal of Network and Computer Applications 126, 45-58, 2019
1062019
Fog computing for Healthcare 4.0 environment: Opportunities and challenges
A Kumari, S Tanwar, S Tyagi, N Kumar
Computers & Electrical Engineering 72, 1-13, 2018
1062018
Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures
D He, S Zeadally, N Kumar, W Wu
IEEE Transactions on Information Forensics and Security 11 (9), 2052-2064, 2016
1052016
Vehicular delay-tolerant networks for smart grid data management using mobile edge computing
N Kumar, S Zeadally, JJPC Rodrigues
IEEE Communications Magazine 54 (10), 60-66, 2016
1012016
Edge computing in the industrial internet of things environment: Software-defined-networks-based edge-cloud interplay
K Kaur, S Garg, GS Aujla, N Kumar, JJPC Rodrigues, M Guizani
IEEE communications magazine 56 (2), 44-51, 2018
992018
Ant colony algorithms in MANETs: A review
G Singh, N Kumar, AK Verma
Journal of Network and Computer Applications 35 (6), 1964-1972, 2012
982012
The system can't perform the operation now. Try again later.
Articles 1–20