Rahul Saha
Rahul Saha
1) UNIPD, Italy 2) Lovely Professional University, India
Verified email at
Cited by
Cited by
Proof-of-work consensus approach in blockchain technology for cloud and fog computing using maximization-factorization statistics
G Kumar, R Saha, MK Rai, R Thomas, TH Kim
IEEE Internet of Things Journal 6 (4), 6835-6842, 2019
Privacy Ensured -Healthcare for Fog-Enhanced IoT Based Applications
R Saha, G Kumar, MK Rai, R Thomas, SJ Lim
IEEE Access 7, 44536-44543, 2019
A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks
TH Kim, R Goyat, MK Rai, G Kumar, WJ Buchanan, R Saha, R Thomas
IEEE access 7, 184133-184144, 2019
Decentralized accessibility of e-commerce products through blockchain technology
G Kumar, R Saha, WJ Buchanan, G Geetha, R Thomas, MK Rai, TH Kim, ...
Sustainable Cities and Society 62, 102361, 2020
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications
G Kumar, R Saha, C Lal, M Conti
Future Generation Computer Systems 120, 13-25, 2021
Blockchain powered secure range-free localization in wireless sensor networks
R Goyat, G Kumar, MK Rai, R Saha, R Thomas, TH Kim
Arabian Journal for Science and Engineering 45, 6139-6155, 2020
Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things
R Goyat, G Kumar, M Alazab, M Conti, MK Rai, R Thomas, R Saha, ...
IEEE Internet of Things Journal 9 (16), 14203-14215, 2020
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys
GKTK Rahul Saha ,G. Geetha
Security and Communication Networks 2018, 11, 2018
A privacy-preserving secure framework for electric vehicles in IoT using matching market and signcryption
G Kumar, R Saha, MK Rai, WJ Buchanan, R Thomas, G Geetha, ...
IEEE Transactions on Vehicular Technology 69 (7), 7707-7722, 2020
A taxonomy of security issues in Industrial Internet-of-Things: scoping review for existing solutions, future implications, and research challenges
P Jayalaxmi, R Saha, G Kumar, N Kumar, TH Kim
IEEE Access 9, 25344-25359, 2021
Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in wireless sensor networks
G Kumar, MK Rai, R Saha
Journal of Network and Computer Applications 99, 10-16, 2017
A privacy preserving distributed ledger framework for global human resource record management: The blockchain aspect
TH Kim, G Kumar, R Saha, MK Rai, WJ Buchanan, R Thomas, M Alazab
IEEE access 8, 96455-96467, 2020
Multidimensional security provision for secure communication in vehicular ad hoc networks using hierarchical structure and end-to-end authentication
G Kumar, R Saha, MK Rai, TH Kim
IEEE Access 6, 46558-46567, 2018
An improved DV-Hop localization with minimum connected dominating set for mobile nodes in wireless sensor networks
G Kumar, MK Rai, R Saha, H Kim
International Journal of Distributed Sensor Networks 14 (1), 1550147718755636, 2018
Symmetric random function generator (SRFG): A novel cryptographic primitive for designing fast and robust algorithms
R Saha, G Geetha
Chaos, Solitons & Fractals 104, 371-377, 2017
A lightweight signcryption method for perception layer in Internet-of-Things
A Kumar, R Saha, M Alazab, G Kumar
Journal of Information Security and Applications 55, 102662, 2020
CAPTCHINO- A Gamification of Image-based CAPTCHAs to Evaluate Usability Issues
GG Rahul Saha, Riyanka Manna
International Conference on Computing Sciences (ICCS 2012), 2012
A survey on security challenges and solutions in the IOTA
M Conti, G Kumar, P Nerurkar, R Saha, L Vigneri
Journal of Network and Computer Applications, 103383, 2022
A secure localization approach using mutual authentication and insider node validation in wireless sensor networks
G Kumar, MK Rai, H Kim, R Saha
Mobile Information Systems 2017, 2017
A secure localization scheme based on trust assessment for WSNs using blockchain technology
R Goyat, G Kumar, M Alazab, R Saha, R Thomas, MK Rai
Future Generation Computer Systems 125, 221-231, 2021
The system can't perform the operation now. Try again later.
Articles 1–20