


default search action
Mritunjay Kumar Rai
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j25]Rekha Goyat
, Gulshan Kumar
, Mamoun Alazab
, Mauro Conti
, Mritunjay Kumar Rai
, Reji Thomas
, Rahul Saha
, Tai-Hoon Kim
:
Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things. IEEE Internet Things J. 9(16): 14203-14215 (2022) - 2021
- [j24]Rekha Goyat, Gulshan Kumar, Mamoun Alazab, Rahul Saha, Reji Thomas, Mritunjay Kumar Rai:
A secure localization scheme based on trust assessment for WSNs using blockchain technology. Future Gener. Comput. Syst. 125: 221-231 (2021) - [j23]Rahul Saha
, Gulshan Kumar, Mritunjay Kumar Rai, Hye-Jin Kim:
Adaptive classifier-based intrusion detection system using logistic regression and Euclidean distance on network probe vectors in resource constrained networks. Int. J. Inf. Comput. Secur. 16(3/4): 226-238 (2021) - [j22]Rahul Saha
, Gulshan Kumar
, G. Geetha
, Tai-Hoon Kim
, Mamoun Alazab
, Reji Thomas
, Mritunjay Kumar Rai
, Joel J. P. C. Rodrigues
:
The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface. IEEE Trans. Veh. Technol. 70(8): 7495-7508 (2021) - 2020
- [j21]Tai-Hoon Kim
, Gulshan Kumar
, Rahul Saha
, Mamoun Alazab
, William J. Buchanan
, Mritunjay Kumar Rai
, G. Geetha
, Reji Thomas
:
CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure. IEEE Access 8: 94748-94756 (2020) - [j20]Tai-Hoon Kim
, Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai
, William J. Buchanan
, Reji Thomas
, Mamoun Alazab
:
A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect. IEEE Access 8: 96455-96467 (2020) - [j19]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai
, Reji Thomas
, G. Geetha
, Tai-Hoon Kim
, Joel J. P. C. Rodrigues
:
A Novel Framework for Fog Computing: Lattice-Based Secured Framework for Cloud Interface. IEEE Internet Things J. 7(8): 7783-7794 (2020) - [j18]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai
, Reji Thomas
, Tai-Hoon Kim
:
A Lattice Signcrypted Secured Localization in Wireless Sensor Networks. IEEE Syst. J. 14(3): 3949-3956 (2020) - [j17]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai
, William J. Buchanan
, Reji Thomas
, G. Geetha
, Tai-Hoon Kim
, Joel J. P. C. Rodrigues
:
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption. IEEE Trans. Veh. Technol. 69(7): 7707-7722 (2020)
2010 – 2019
- 2019
- [j16]Rahul Saha
, Gulshan Kumar
, Mritunjay Kumar Rai, Reji Thomas, Se-Jung Lim:
Privacy Ensured ${e}$ -Healthcare for Fog-Enhanced IoT Based Applications. IEEE Access 7: 44536-44543 (2019) - [j15]Tai-Hoon Kim
, Rekha Goyat, Mritunjay Kumar Rai
, Gulshan Kumar
, William J. Buchanan
, Rahul Saha
, Reji Thomas
:
A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks. IEEE Access 7: 184133-184144 (2019) - [j14]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai, Reji Thomas, Tai-Hoon Kim
:
Proof-of-Work Consensus Approach in Blockchain Technology for Cloud and Fog Computing Using Maximization-Factorization Statistics. IEEE Internet Things J. 6(4): 6835-6842 (2019) - [j13]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai, Reji Thomas, Tai-Hoon Kim
, Se-Jung Lim
, Jai Sukh Paul Singh
:
Improved Location Estimation in Wireless Sensor Networks Using a Vector-Based Swarm Optimized Connected Dominating Set. Sensors 19(2): 376 (2019) - [j12]Rekha Goyat, Mritunjay Kumar Rai, Gulshan Kumar
, Rahul Saha
, Tai-Hoon Kim
:
Energy Efficient Range-Free Localization Algorithm for Wireless Sensor Networks. Sensors 19(16): 3603 (2019) - 2018
- [j11]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai, Tai-Hoon Kim
:
Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication. IEEE Access 6: 46558-46567 (2018) - [j10]Gulshan Kumar
, Mritunjay Kumar Rai
, Rahul Saha
, Hye-Jin Kim:
An improved DV-Hop localization with minimum connected dominating set for mobile nodes in wireless sensor networks. Int. J. Distributed Sens. Networks 14(1) (2018) - [j9]Gulshan Kumar
, Rahul Saha
, Mandeep Singh, Mritunjay Kumar Rai:
Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN. Int. J. Inf. Secur. Priv. 12(1): 53-62 (2018) - [j8]Jai Sukh Paul Singh
, Mritunjay Kumar Rai:
CROP: Cognitive radio ROuting Protocol for link quality channel diverse cognitive networks. J. Netw. Comput. Appl. 104: 48-60 (2018) - [j7]Jai Sukh Paul Singh
, Mritunjay Kumar Rai
, Gulshan Kumar
, Rajwinder Singh, Hye-Jin Kim
, Tai-Hoon Kim:
Advanced Multiresolution Wavelet Based Wideband Spectrum Sensing Technique for Cognitive Radio. Wirel. Commun. Mob. Comput. 2018: 1908536:1-1908536:13 (2018) - 2017
- [j6]Gulshan Kumar
, Mritunjay Kumar Rai:
An energy efficient and optimized load balanced localization method using CDS with one-hop neighbourhood and genetic algorithm in WSNs. J. Netw. Comput. Appl. 78: 73-82 (2017) - [j5]Gulshan Kumar
, Mritunjay Kumar Rai, Rahul Saha
:
Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in Wireless Sensor Networks. J. Netw. Comput. Appl. 99: 10-16 (2017) - [j4]Gulshan Kumar
, Mritunjay Kumar Rai
, Hye-Jin Kim
, Rahul Saha
:
A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks. Mob. Inf. Syst. 2017: 3243570:1-3243570:12 (2017) - [j3]Max Bhatia
, Mritunjay Kumar Rai:
Identifying P2P traffic: A survey. Peer-to-Peer Netw. Appl. 10(5): 1182-1203 (2017) - [j2]Jai Sukh Paul Singh
, Mritunjay Kumar Rai:
Cognitive radio intelligent-MAC (CR-i-MAC): channel-diverse contention free approach for spectrum management. Telecommun. Syst. 64(3): 495-508 (2017) - 2015
- [j1]Jai Sukh Paul Singh
, Rajwinder Singh, Mritunjay Kumar Rai, Jasvir Singh, A. S. Kang:
Cooperative Sensing for Cognitive Radio: A Powerful Access Method for Shadowing Environment. Wirel. Pers. Commun. 80(4): 1363-1379 (2015) - 2011
- [c1]Gulshan Kumar
, Mritunjay Kumar Rai, Gang-soo Lee:
An Approach to Provide Security in Wireless Sensor Network Using Block Mode of Cipher. FGIT-SecTech 2011: 101-112 - [i2]Gulshan Kumar, Mritunjay Kumar Rai:
X-ray view on a Class using Conceptual Analysis in Java Environment. CoRR abs/1110.3384 (2011) - [i1]Gulshan Kumar, Mritunjay Kumar Rai:
An Approach to Provide Security in Mobile Ad-Hoc Networks Using Counter Mode of Encryption on Mac Layer. CoRR abs/1110.3386 (2011)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint