Follow
Gulshan Kumar, SMIEEE
Gulshan Kumar, SMIEEE
SPRITZ Research Group, Department of Mathematics, University of Padua
Verified email at unipd.it
Title
Cited by
Cited by
Year
Proof-of-work consensus approach in blockchain technology for cloud and fog computing using maximization-factorization statistics
G Kumar, R Saha, MK Rai, R Thomas, TH Kim
IEEE Internet of Things Journal 6 (4), 6835-6842, 2019
1142019
Privacy Ensured -Healthcare for Fog-Enhanced IoT Based Applications
R Saha, G Kumar, MK Rai, R Thomas, SJ Lim
IEEE Access 7, 44536-44543, 2019
742019
A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks
TH Kim, R Goyat, MK Rai, G Kumar, WJ Buchanan, R Saha, R Thomas
IEEE access 7, 184133-184144, 2019
652019
Decentralized accessibility of e-commerce products through blockchain technology
G Kumar, R Saha, WJ Buchanan, G Geetha, R Thomas, MK Rai, TH Kim, ...
Sustainable Cities and Society 62, 102361, 2020
502020
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications
G Kumar, R Saha, C Lal, M Conti
Future Generation Computer Systems 120, 13-25, 2021
352021
Robust and lightweight mutual authentication scheme in distributed smart environments
GS Gaba, G Kumar, H Monga, TH Kim, P Kumar
IEEE Access 8, 69722-69733, 2020
332020
Blockchain powered secure range-free localization in wireless sensor networks
R Goyat, G Kumar, MK Rai, R Saha, R Thomas, TH Kim
Arabian Journal for Science and Engineering 45, 6139-6155, 2020
312020
Secure device-to-device communications for 5g enabled internet of things applications
GS Gaba, G Kumar, TH Kim, H Monga, P Kumar
Computer Communications 169, 114-128, 2021
302021
An energy efficient and optimized load balanced localization method using CDS with one-hop neighbourhood and genetic algorithm in WSNs
G Kumar, MK Rai
Journal of Network and Computer Applications 78, 73-82, 2017
302017
Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things
R Goyat, G Kumar, M Alazab, M Conti, MK Rai, R Thomas, R Saha, ...
IEEE Internet of Things Journal 9 (16), 14203-14215, 2020
292020
Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0
GS GABA, G KUMAR, H MONGA, TAIH KIM, M LIYANAGE
IEEE Access 8, 132808-132824, 2020
292020
RK-AES: an improved version of AES using a new key generation process with random keys
R Saha, G Geetha, G Kumar, T Kim
Security and Communication Networks 2018, 1-11, 2018
282018
A privacy-preserving secure framework for electric vehicles in IoT using matching market and signcryption
G Kumar, R Saha, MK Rai, WJ Buchanan, R Thomas, G Geetha, ...
IEEE Transactions on Vehicular Technology 69 (7), 7707-7722, 2020
272020
A taxonomy of security issues in Industrial Internet-of-Things: scoping review for existing solutions, future implications, and research challenges
P Jayalaxmi, R Saha, G Kumar, N Kumar, TH Kim
IEEE Access 9, 25344-25359, 2021
262021
Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in wireless sensor networks
G Kumar, MK Rai, R Saha
Journal of Network and Computer Applications 99, 10-16, 2017
262017
A privacy preserving distributed ledger framework for global human resource record management: The blockchain aspect
TH Kim, G Kumar, R Saha, MK Rai, WJ Buchanan, R Thomas, M Alazab
IEEE access 8, 96455-96467, 2020
242020
Multidimensional security provision for secure communication in vehicular ad hoc networks using hierarchical structure and end-to-end authentication
G Kumar, R Saha, MK Rai, TH Kim
IEEE Access 6, 46558-46567, 2018
232018
Implementation of cipher block chaining in wireless sensor networks for security enhancement
G Kumar, M Rai, G Lee
International Journal of Security and Its Applications 6 (1), 57-72, 2012
232012
An improved DV-Hop localization with minimum connected dominating set for mobile nodes in wireless sensor networks
G Kumar, MK Rai, R Saha, H Kim
International Journal of Distributed Sensor Networks 14 (1), 1550147718755636, 2018
212018
A lightweight signcryption method for perception layer in Internet-of-Things
A Kumar, R Saha, M Alazab, G Kumar
Journal of Information Security and Applications 55, 102662, 2020
162020
The system can't perform the operation now. Try again later.
Articles 1–20