


default search action
Preeti Chandrakar
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j21]Brijmohan Lal Sahu
, Preeti Chandrakar
:
Secure blockchain-based IoV architecture integrated with PUFs for secure vehicular communication. Comput. Electr. Eng. 123: 110069 (2025) - [j20]Narendra K. Dewangan
, Preeti Chandrakar:
Patient-centric information management in blockchain and interplanetary storage. J. Ambient Intell. Humaniz. Comput. 16(1): 85-96 (2025) - [j19]Gauri Shankar
, Parvinder Singh, Narendra Kumar Dewangan
, Preeti Chandrakar:
DEMRISEC: security enhancement of patient data in decentralized medical records with IPFS. Multim. Tools Appl. 84(13): 12123-12140 (2025) - [j18]Brijmohan Lal Sahu
, Preeti Chandrakar:
Blockchain-oriented secure communication and smart parking model for internet of electric vehicles in smart cities. Peer Peer Netw. Appl. 18(1): 1-17 (2025) - [j17]Akhilesh Sharma, Preeti Chandrakar, Saru Kumari, Chien-Ming Chen:
FinSec: A Consortium Blockchain-Enabled Privacy-Preserving and Scalable Framework For Customer Data Protection In FinTech. Peer Peer Netw. Appl. 18(3): 131 (2025) - [j16]Narendra K. Dewangan, Preeti Chandrakar:
TreatChain: A patient-centric treatment cycle blockchain using proof-of-upload consensus. Peer Peer Netw. Appl. 18(3): 154 (2025) - 2024
- [j15]Narendra K. Dewangan
, Preeti Chandrakar:
Implementing blockchain and deep learning in the development of an educational digital twin. Soft Comput. 28(9-10): 6619-6636 (2024) - [j14]Brijmohan Lal Sahu
, Preeti Chandrakar
, Saru Kumari
, Chien-Ming Chen
, Mohammed Amoon
:
Blockchain and Machine Learning Integrated Secure Driver Behavior Centric Electric Vehicle Insurance Model. IEEE Trans. Intell. Transp. Syst. 25(11): 19073-19087 (2024) - 2023
- [j13]Venkatesh Gauri Shankar
, Dilip Singh Sisodia
, Preeti Chandrakar
:
An intelligent hierarchical residual attention learning-based conjoined twin neural network for Alzheimer's stage detection and prediction. Comput. Intell. 39(5): 783-805 (2023) - [j12]Narendra K. Dewangan
, Preeti Chandrakar, Saru Kumari, Joel J. P. C. Rodrigues:
Enhanced privacy-preserving in student certificate management in blockchain and interplanetary file system. Multim. Tools Appl. 82(8): 12595-12614 (2023) - [j11]Narendra K. Dewangan
, Preeti Chandrakar
:
Patient-Centric Token-Based Healthcare Blockchain Implementation Using Secure Internet of Medical Things. IEEE Trans. Comput. Soc. Syst. 10(6): 3109-3119 (2023) - [j10]Narendra K. Dewangan
, Preeti Chandrakar:
TempChain: a blockchain scheme for telehealth data sharing between two blockchains using property mapping function. J. Supercomput. 79(13): 14808-14826 (2023) - [c7]Narendra Kumar Dewangan
, Preeti Chandrakar
:
A privacy-preserved blockchain for vehicles in smart societies. AIR 2023: 2:1-2:5 - [c6]Anurag Deep Kujur, Preeti Chandrakar:
Three Factor Authentication Scheme for Telecare Medical Information System. CoCoLe 2023: 159-174 - [c5]Akhilesh Sharma, Preeti Chandrakar:
TruChit: A Blockchain-Based Trusted Chit Fund System with Creditworthiness Evaluation. ICMLDE 2023: 1376-1385 - [c4]Brijmohan Lal Sahu, Preeti Chandrakar:
Enhanced Privacy Preservation and Data Storage in Blockchain-Based Electric Vehicle Network. ICMLDE 2023: 2144-2153 - 2022
- [j9]Venkatesh Gauri Shankar
, Dilip Singh Sisodia
, Preeti Chandrakar
:
A novel discriminant feature selection-based mutual information extraction from MR brain images for Alzheimer's stages detection and prediction. Int. J. Imaging Syst. Technol. 32(4): 1172-1191 (2022) - [c3]Preeti Chandrakar, Narendra K. Dewangan
, Karan Chandrakar:
Decentralized Energy Management in Smart Cities Using Blockchain Technology. CoCoLe 2022: 103-114 - 2021
- [j8]Pallavi Bhuarya
, Preeti Chandrakar
, Rifaqat Ali
, Aakanksha Sharaff
:
An enhanced authentication scheme for Internet of Things and cloud based on elliptic curve cryptography. Int. J. Commun. Syst. 34(10) (2021) - 2020
- [j7]Preeti Chandrakar
, Sonam Sinha, Rifaqat Ali
:
Cloud-based authenticated protocol for healthcare monitoring system. J. Ambient Intell. Humaniz. Comput. 11(8): 3431-3447 (2020) - [c2]Rifaqat Ali, Preeti Chandrakar, Mohammad S. Obaidat, Kuei-Fang Hsiao, Arup Kumar Pal, SK Hafizul Islam:
A Secure Authentication Mechanism for Wireless Sensor Networks. CITS 2020: 1-8
2010 – 2019
- 2019
- [j6]Preeti Chandrakar:
A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks. Int. J. Ambient Comput. Intell. 10(1): 96-116 (2019) - 2018
- [j5]Preeti Chandrakar
, Hari Om:
An extended ECC-based anonymity-preserving 3-factor remote authentication scheme usable in TMIS. Int. J. Commun. Syst. 31(8) (2018) - 2017
- [j4]Preeti Chandrakar, Hari Om:
A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC. Comput. Commun. 110: 26-34 (2017) - [j3]Preeti Chandrakar
, Hari Om:
Cryptanalysis and improvement of a biometric-based remote user authentication protocol usable in a multiserver environment. Trans. Emerg. Telecommun. Technol. 28(12) (2017) - [j2]Preeti Chandrakar, Hari Om:
Cryptanalysis and Security Enhancement of Three-Factor Remote User Authentication Scheme for Multi-Server Environment. Int. J. Bus. Data Commun. Netw. 13(1): 85-101 (2017) - [c1]Preeti Chandrakar, Hari Om:
A Secure and Privacy Preserving Remote User Authentication Protocol for Internet of Things Environment. CICBA (1) 2017: 537-551 - 2016
- [j1]Preeti Chandrakar, Hari Om:
A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme. Int. J. Bus. Data Commun. Netw. 12(2): 62-79 (2016)
Coauthor Index
aka: Narendra Kumar Dewangan

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-06-17 00:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint