Dr. Neeraj Kumar, SMIEEE, MIES
Dr. Neeraj Kumar, SMIEEE, MIES
Full Professor, Department of Computer Science and Engineering, Thapar Institute of Engineering
Verified email at thapar.edu
TitleCited byYear
A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks
S Tyagi, N Kumar
Journal of Network and Computer Applications 36 (2), 623-645, 2013
Anonymous authentication for wireless body area networks with provable security
D He, S Zeadally, N Kumar, JH Lee
IEEE Systems Journal 11 (4), 2590-2601, 2016
A systematic review on routing protocols for vehicular ad hoc networks
A Dua, N Kumar, S Bawa
Vehicular Communications 1 (1), 33-52, 2014
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D He, N Kumar, J Chen, CC Lee, N Chilamkurti, SS Yeo
Multimedia Systems 21 (1), 49-60, 2015
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D He, N Kumar, N Chilamkurti
Information Sciences 321, 263-277, 2015
Clustering in vehicular ad hoc networks: taxonomy, challenges and solutions
RS Bali, N Kumar, JJPC Rodrigues
Vehicular communications 1 (3), 134-152, 2014
Enhanced three-factor security protocol for consumer USB mass storage devices
D He, N Kumar, JH Lee, RS Sherratt
IEEE Transactions on Consumer Electronics 60 (1), 30-37, 2014
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, L Leng, N Kumar
Computer Networks 101, 42-62, 2016
Decision tree and SVM-based data analytics for theft detection in smart grid
A Jindal, A Dua, K Kaur, M Singh, N Kumar, S Mishra
IEEE Transactions on Industrial Informatics 12 (3), 1005-1016, 2016
A systematic review on heterogeneous routing protocols for wireless sensor network
S Tanwar, N Kumar, JJPC Rodrigues
Journal of network and computer applications 53, 39-56, 2015
Ant colony algorithms in MANETs: A review
G Singh, N Kumar, AK Verma
Journal of Network and Computer Applications 35 (6), 1964-1972, 2012
Secure signature-based authenticated key establishment scheme for future IoT applications
S Challa, M Wazid, AK Das, N Kumar, AG Reddy, EJ Yoon, KY Yoo
IEEE Access 5, 3028-3043, 2017
Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures
D He, S Zeadally, N Kumar, W Wu
IEEE Transactions on Information Forensics and Security 11 (9), 2052-2064, 2016
Intelligent mobile video surveillance system as a Bayesian coalition game in vehicular sensor networks: Learning automata approach
N Kumar, JH Lee, JJPC Rodrigues
IEEE Transactions on Intelligent Transportation Systems 16 (3), 1148-1161, 2014
Learning automata-based opportunistic data aggregation and forwarding scheme for alert generation in vehicular ad hoc networks
N Kumar, N Chilamkurti, JJPC Rodrigues
Computer Communications 39, 22-32, 2014
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
R Amin, N Kumar, GP Biswas, R Iqbal, V Chang
Future Generation Computer Systems 78, 1005-1019, 2018
One-to-many authentication for access control in mobile pay-TV systems
D He, N Kumar, H Shen, JH Lee
Science China Information Sciences 59 (5), 052108, 2016
A robust and anonymous patient monitoring system using wireless medical sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, N Kumar
Future Generation Computer Systems 80, 483-495, 2018
Collaborative trust aware intelligent intrusion detection in VANETs
N Kumar, N Chilamkurti
Computers & Electrical Engineering 40 (6), 1981-1996, 2014
Peer-to-peer cooperative caching for data dissemination in urban vehicular communications
N Kumar, JH Lee
IEEE Systems Journal 8 (4), 1136-1144, 2013
The system can't perform the operation now. Try again later.
Articles 1–20