default search action
Dharminder Chaudhary
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j32]Uddeshaya Kumar, Manish Garg, Dharminder Chaudhary:
Design and analysis of a post-quantum secure three party authenticated key agreement protocol based on ring learning with error for mobile device. J. Supercomput. 81(1): 9 (2025) - 2024
- [j31]Dharminder Chaudhary, Pradeep Kumar Dadsena, A. Padmavathi, Mohammad Mehedi Hassan, Bader Fahad Alkhamees, Uddeshaya Kumar:
Anonymous Quantum Safe Construction of Three Party Authentication and Key Agreement Protocol for Mobile Devices. IEEE Access 12: 74572-74585 (2024) - [j30]Dharminder Chaudhary, P. Santhi, M. S. P. Durgarao, A. Padmavathi, Mohammad Mehedi Hassan, Bader Fahad Alkhamees:
Module Lattice-Based Post Quantum Secure Blockchain Empowered Authentication Framework for Autonomous Truck Platooning. IEEE Access 12: 105219-105233 (2024) - [j29]Dushyant Kumar Yadav, Hemlal Sahu, Dharminder Chaudhary, Cheng-Chi Lee:
Module lattice based post quantum secure blockchain empowered vehicle to vehicle communication in the internet of vehicles. Comput. Electr. Eng. 117: 109245 (2024) - [j28]Dharminder Chaudhary, Cheng-Chi Lee:
Anonymous quantum-safe secure and authorized communication protocol under dynamic identities for Internet of Drones. Comput. Electr. Eng. 120: 109774 (2024) - [j27]Dharminder Chaudhary, M. S. P. Durgarao, Dheerendra Mishra, Saru Kumari:
A module lattice based construction of post quantum secure blockchain architecture. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j26]Ashutosh Aithekar, Pratik Gupta, Dharminder Chaudhary:
A secure and efficient heterogeneous ID-based signcryption for unmanned aerial vehicular networking system. Secur. Priv. 7(5) (2024) - 2023
- [j25]B. Natarajan, R. Elakkiya, R. Bhuvaneswari, Kashif Saleem, Dharminder Chaudhary, Syed Husain Samsudeen:
Creating Alert Messages Based on Wild Animal Activity Detection Using Hybrid Deep Neural Networks. IEEE Access 11: 67308-67321 (2023) - [j24]Tannu Sharma, M. Ranjith Kumar, Sachin Kaushal, Dharminder Chaudhary, Kashif Saleem:
Privacy Aware Post Quantum Secure Ant Colony Optimization Ad Hoc On-Demand Distance Vector Routing in Intent Based Internet of Vehicles for 5G Smart Cities. IEEE Access 11: 110391-110399 (2023) - [j23]Dharminder Chaudhary, Uddeshaya Kumar, Kashif Saleem:
A Construction of Three Party Post Quantum Secure Authenticated Key Exchange Using Ring Learning With Errors and ECC Cryptography. IEEE Access 11: 136947-136957 (2023) - [j22]Uddeshaya Kumar, Manish Garg, Saru Kumari, Dharminder Dharminder:
A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication. Trans. Emerg. Telecommun. Technol. 34(1) (2023) - [j21]Dharminder Dharminder, Dheerendra Mishra:
PSMECS: A provably secure ID-based communication in mobile edge computing. Int. J. Commun. Syst. 36(12) (2023) - [j20]Dharminder Dharminder, Pradeep Kumar Dadsena, Pratik Gupta, Sathya Sankaran:
A post quantum secure construction of an authentication protocol for satellite communication. Int. J. Satell. Commun. Netw. 41(1): 14-28 (2023) - [j19]Dharminder Chaudhary, Tanmay Soni, Kondeti Lakshmi Vasudev, Kashif Saleem:
A modified lightweight authenticated key agreement protocol for Internet of Drones. Internet Things 21: 100669 (2023) - [j18]Dharminder Dharminder, Challa Bhageeratha Reddy, Ashok Kumar Das, Youngho Park, Sajjad Shaukat Jamal:
Post-Quantum Lattice-Based Secure Reconciliation Enabled Key Agreement Protocol for IoT. IEEE Internet Things J. 10(3): 2680-2692 (2023) - [j17]Pradeep Kumar Dadsena, Jainendra Jain, Saurabh Rana, Dharminder Dharminder:
A construction of post quantum secure authenticated key agreement design for mobile digital rights management system. Multim. Tools Appl. 82(17): 26643-26660 (2023) - [j16]Dharminder Dharminder, Pradeep Kumar Dadsena, Dheerendra Mishra:
Construction of system friendly attribute based fully distributed access control architecture for e-healthcare. Multim. Tools Appl. 82(17): 26937-26953 (2023) - [j15]Ashutosh Aithekar, Pratik Gupta, Dharminder Dharminder:
A provably secure, shortest, and efficient identity based signcryption technique in the standard model. Secur. Priv. 6(1) (2023) - [c3]Uddeshaya Kumar, Yogesh Pal, Perla Sai Nikhil, Manish Garg, M. Ranjith Kumar, Dharminder Chaudhary:
A Construction of Three Party Post Quantum Secure Authenticated Key Exchange for Mobile Users. ICCCNT 2023: 1-7 - [c2]Tannu Sharma, M. S. P. Durgarao, Kethamreddy Karthikeya Reddy, Sachin Kaushal, A G. Sreedevi, Dharminder Chaudhary:
Post Quantum Blockchain Based Lightweight Edge Server Handover Authentication Key Agreement Protocol for Vehicular Communication System. ICCCNT 2023: 1-6 - 2022
- [j14]Dharminder Dharminder, Uddeshaya Kumar, Ashok Kumar Das, Basudeb Bera, Debasis Giri, Sajjad Shaukat Jamal, Joel J. P. C. Rodrigues:
Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for IoT applications. Trans. Emerg. Telecommun. Technol. 33(9) (2022) - [j13]Dharminder Dharminder, Ankur Nehra, Aditya Arya:
A construction of Chebyshev chaotic map based authenticated key agreement protocol for satellite communication system. Secur. Priv. 5(6) (2022) - [j12]Dharminder Dharminder, Dheerendra Mishra, Joel J. P. C. Rodrigues, Ricardo de A. L. Rabelo, Kashif Saleem:
PSSCC: Provably secure communication framework for crowdsourced industrial Internet of Things environments. Softw. Pract. Exp. 52(3): 744-755 (2022) - 2021
- [j11]Dharminder Dharminder:
LWEDM: Learning with error based secure mobile digital rights management system. Trans. Emerg. Telecommun. Technol. 32(2) (2021) - [j10]Dharminder Dharminder, Saru Kumari, Uddeshaya Kumar:
Post quantum secure conditional privacy preserving authentication for edge based vehicular communication. Trans. Emerg. Telecommun. Technol. 32(11) (2021) - [j9]Dharminder Dharminder, Nibedita Kundu, Dheerendra Mishra:
Construction of a Chaotic Map-Based Authentication Protocol for TMIS. J. Medical Syst. 45(8): 77 (2021) - [j8]Dharminder Dharminder, Uddeshaya Kumar, Pratik Gupta:
Edge based authentication protocol for vehicular communications without trusted party communication. J. Syst. Archit. 119: 102242 (2021) - [j7]Dheerendra Mishra, Mohammad S. Obaidat, Saurabh Rana, Dharminder Dharminder, Ankita Mishra, Balqies Sadoun:
Chaos-Based Content Distribution Framework for Digital Rights Management System. IEEE Syst. J. 15(1): 570-576 (2021) - [j6]Dharminder Dharminder, Mohammad S. Obaidat, Dheerendra Mishra, Ashok Kumar Das:
SFEEC: Provably Secure Signcryption-Based Big Data Security Framework for Energy-Efficient Computing Environment. IEEE Syst. J. 15(1): 598-606 (2021) - 2020
- [j5]Dharminder Dharminder, Dheerendra Mishra:
LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication. Trans. Emerg. Telecommun. Technol. 31(2) (2020) - [j4]Dheerendra Mishra, Dharminder Dharminder, Preeti Yadav, Y. Sreenivasa Rao, Pandi Vijayakumar, Neeraj Kumar:
A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party. J. Inf. Secur. Appl. 55: 102648 (2020) - [j3]Dharminder Dharminder, K. Prabhu Chandran:
LWESM: learning with error based secure communication in mobile devices using fuzzy extractor. J. Ambient Intell. Humaniz. Comput. 11(10): 4089-4100 (2020) - [j2]Dharminder Dharminder, Dheerendra Mishra, Xiong Li:
Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services - Authorized Access to Healthcare Services. J. Medical Syst. 44(1): 6:1-6:9 (2020) - [j1]Dharminder Dharminder, Dheerendra Mishra:
Understanding signcryption security in standard model. Secur. Priv. 3(3) (2020) - [c1]Dharminder Dharminder, Dheerendra Mishra:
Construction of Identity Based Signcryption Using Learning with Rounding. MIND (2) 2020: 612-626
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint