default search action
Nishant Doshi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Chintan Patel, Nishant Doshi:
LDA-2IoT: A level dependent authentication using two factor for IoT paradigm. Comput. Networks 223: 109580 (2023) - [j11]Nishant Doshi:
An enhanced constant length traceable CP-ABE in IoT paradigm. Int. J. Electron. Secur. Digit. Forensics 15(3): 315-321 (2023) - [c23]Nishant Doshi, Payal Chaudhari:
Cryptanalysis of Authentication Protocol for Cloud Assisted IoT Environment. ANT/EDI40 2023: 886-891 - 2022
- [j10]Chintan Patel, Nishant Doshi:
LDA-IoT : a level dependent authentication for IoT paradigm. Inf. Secur. J. A Glob. Perspect. 31(6): 629-656 (2022) - [j9]Krish Bhanushali, Viren Sureja, Vidhan Patel, Tanmay Thaker, Nishant Doshi:
Database Management System for Smart Gym Using IoT. J. Ubiquitous Syst. Pervasive Networks 16(1): 23-27 (2022) - [c22]Nabhi Shah, Saumya Shah, Pulak Jain, Nishant Doshi:
Overview of Present-Day IoT Data Processing Technologies. EUSPN/ICTH 2022: 277-282 - [c21]Stavan Shah, Anshumansinh Jadeja, Nishant Doshi:
An Analytical Survey of Energy Efficiency in IoT Paradigm. EUSPN/ICTH 2022: 283-288 - [c20]Kunj Shah, Chaitanya Sheth, Nishant Doshi:
A Survey on IoT-Based Smart Cars, their Functionalities and Challenges. EUSPN/ICTH 2022: 295-300 - [i10]Chintan Patel, Nishant Doshi:
LDA-2IoT : A Level Dependent Authentication using Two Factor for IoT Paradigm. CoRR abs/2207.02706 (2022) - 2021
- [j8]Vishv Patel, Devansh Shah, Nishant Doshi:
Emerging Technologies and Applications for Smart Cities. J. Ubiquitous Syst. Pervasive Networks 15(2): 19-24 (2021) - [j7]Chintan Patel, Nishant Doshi:
Secure Lightweight Key Exchange Using ECC for User-Gateway Paradigm. IEEE Trans. Computers 70(11): 1789-1803 (2021) - [c19]Aman Shah, Dev Shah, Devanshi Shah, Daksh Chordiya, Nishant Doshi, Rudresh Dwivedi:
Blood Bank Management and Inventory Control Database Management System. EUSPN/ICTH 2021: 404-409 - [i9]Khushi Shah, Aryan Shah, Charmi Shah, Devansh Shah, Mustafa Africawala, Rushabh Shah, Nishant Doshi:
Proposed DBMS for OTT platforms in line with new age requirements. CoRR abs/2106.00932 (2021) - 2020
- [j6]Chintan Patel, Dhara Joshi, Nishant Doshi, A. Veeramuthu, Rutvij H. Jhaveri:
An enhanced approach for three factor remote user authentication in multi - server environment. J. Intell. Fuzzy Syst. 39(6): 8609-8620 (2020) - [c18]Anooksha Yogesh Rathod, Shubham Pandya, Nishant Doshi:
IoT and Modern Marketing: Its Social Implications. ICACT 2020: 407-413 - [i8]Chintan Patel, Nishant Doshi:
A Level Dependent Authentication for IoT Paradigm. IACR Cryptol. ePrint Arch. 2020: 686 (2020)
2010 – 2019
- 2019
- [c17]Prayushi Faldu, Nishant Doshi, Reema Patel:
Real Time Adaptive Traffic Control System : A Hybrid Approach. ICCCS 2019: 697-701 - [c16]Fenil Dankhara, Kartik Patel, Nishant Doshi:
Analysis of robust weed detection techniques based on the Internet of Things (IoT). EUSPN/ICTH 2019: 696-701 - [c15]Jigar Shah, Jinal Kothari, Nishant Doshi:
A Survey of Smart City infrastructure via Case study on New York. EUSPN/ICTH 2019: 702-705 - [c14]Sahil Rupani, Nishant Doshi:
A Review of Smart Parking Using Internet of Things (IoT). EUSPN/ICTH 2019: 706-711 - [c13]Sumeet Sachdev, Joel Macwan, Chintan Patel, Nishant Doshi:
Voice-Controlled Autonomous Vehicle Using IoT. EUSPN/ICTH 2019: 712-717 - [c12]Aniket Singh Solanki, Chintan Patel, Nishant Doshi:
Smart cities-A case study of Porto and Ahmedabad. EUSPN/ICTH 2019: 718-722 - [c11]Karan Lohia, Yash Jain, Chintan Patel, Nishant Doshi:
Open Communication Protocols for Building Automation Systems. EUSPN/ICTH 2019: 723-727 - [c10]Shivank Vyas, Vipin Shukla, Nishant Doshi:
FMD and Mastitis Disease Detection in Cows Using Internet of Things (IOT). EUSPN/ICTH 2019: 728-733 - [c9]Shalin Parikh, Dharmin Dave, Reema Patel, Nishant Doshi:
Security and Privacy Issues in Cloud, Fog and Edge Computing. EUSPN/ICTH 2019: 734-739 - [c8]Dharmin Dave, Shalin Parikh, Reema Patel, Nishant Doshi:
A Survey on Blockchain Technology and its Proposed Solutions. EUSPN/ICTH 2019: 740-745 - [c7]Chintan Patel, Nishant Doshi:
Cryptanalysis of ecc-based key agreement scheme for generic IoT network model. ICCCNT 2019: 1-7 - 2018
- [j5]Manish Shingala, Chintan Patel, Nishant Doshi:
An Improve Three Factor Remote User Authentication Scheme Using Smart Card. Wirel. Pers. Commun. 99(1): 227-251 (2018) - [c6]Nishant Doshi, Chintan Patel:
A Novel Approach for Biometric Based Remote User Authentication Scheme using Smart Card. ICACCI 2018: 2093-2097 - [c5]Nishant Doshi:
Analysis of Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid of IoT. ICO 2018: 515-521 - 2017
- [j4]Trupil Limbasiya, Nishant Doshi:
An analytical study of biometric based remote user authentication schemes using smart cards. Comput. Electr. Eng. 59: 305-321 (2017) - [j3]Nishant Doshi, Saru Kumari, Dheerendra Mishra, Xiong Li, Kim-Kwang Raymond Choo, Arun Kumar Sangaiah:
A password based authentication scheme for wireless multimedia systems. Multim. Tools Appl. 76(24): 25893-25918 (2017) - 2016
- [j2]Nishant Doshi, Devesh C. Jinwala:
A novel approach for privacy homomorphism using attribute-based encryption. Secur. Commun. Networks 9(17): 4451-4467 (2016) - [c4]Trupil Limbasiya, Nishant Doshi:
A User Privacy Conserving Authentication System Using Smart Card for Telecare Medicine Information Systems. ICTCS 2016: 20:1-20:5 - 2015
- [c3]Chirag Modi, Ashwini R. Patil, Nishant Doshi:
An efficient approach for privacy preserving distributed mining of association rules in unsecured environment. ICACCI 2015: 753-758 - [i7]Trupil Limbasiya, Nishant Doshi:
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD. IACR Cryptol. ePrint Arch. 2015: 587 (2015) - 2014
- [j1]Nishant Doshi, Devesh C. Jinwala:
Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption. Secur. Commun. Networks 7(11): 1988-2002 (2014) - [i6]Nishant Doshi:
Approximation for the Path Complexity of Binary Search Tree. CoRR abs/1404.4692 (2014) - 2012
- [c2]Nishant Goswami, Tarulata Chauhan, Nishant Doshi:
Efficient Cryptography Technique on Perturbed Data in Distributed Environment. ACITY (1) 2012: 239-244 - [i5]Vishal Vadgama, Bhavin Tanti, Chirag Modi, Nishant Doshi:
A novel approach for e-payment using virtual password system. CoRR abs/1208.3859 (2012) - [i4]Nishant Doshi, Devesh Jinwala:
Updating attribute in CP-ABE: A New Approach. IACR Cryptol. ePrint Arch. 2012: 496 (2012) - [i3]Nishant Doshi, Devesh Jinwala:
Constant Ciphertext Length in CP-ABE. IACR Cryptol. ePrint Arch. 2012: 500 (2012) - 2011
- [c1]Nishant Doshi, Devesh Jinwala:
Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext. ADCONS 2011: 515-523 - 2010
- [i2]Nishant Doshi:
A secure email login system using virtual password. CoRR abs/1009.5729 (2010) - [i1]Bhavin Tanti, Nishant Doshi:
A secure email login system using virtual password. IACR Cryptol. ePrint Arch. 2010: 481 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint