default search action
Chhagan Lal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j53]B. Vijaya Bhaskara Rao, Umashankar Rawat, Satyabrata Roy, Chhagan Lal:
SORCHIC: A Hybrid Image Cipher for IoT Applications Using Second Order Reversible Cellular Automata. IEEE Access 12: 146147-146159 (2024) - [j52]Vaishali A. Shirsath, Madhav Chandane, Chhagan Lal, Mauro Conti:
SYNTROPY: TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy. Comput. Networks 244: 110327 (2024) - [j51]Mohd Shariq, Mauro Conti, Karan Singh, Chhagan Lal, Ashok Kumar Das, Shehzad Ashraf Chaudhry, Mehedi Masud:
Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing. Comput. Networks 252: 110678 (2024) - [j50]Vaishali A. Shirsath, Madhav Chandane, Chhagan Lal, Mauro Conti:
SPARQ: SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches. Comput. Commun. 216: 283-294 (2024) - [j49]Bhawana Sharma, Lokesh Sharma, Chhagan Lal, Satyabrata Roy:
Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach. Expert Syst. Appl. 238(Part A): 121751 (2024) - [j48]Mohamed A. El-Zawawy, Chhagan Lal, Mauro Conti:
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 25(2): 2017-2033 (2024) - [j47]Meng Li, Jianbo Gao, Liehuang Zhu, Zijian Zhang, Chhagan Lal, Mauro Conti:
Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud. IEEE Trans. Serv. Comput. 17(3): 1239-1251 (2024) - 2023
- [j46]Hossein Ahmadvand, Chhagan Lal, Hadi Hemmati, Mehdi Sookhak, Mauro Conti:
Privacy-Preserving and Security in SDN-Based IoT: A Survey. IEEE Access 11: 44772-44786 (2023) - [j45]Bhawana Sharma, Lokesh Sharma, Chhagan Lal, Satyabrata Roy:
Anomaly based network intrusion detection for IoT attacks using deep learning technique. Comput. Electr. Eng. 107: 108626 (2023) - [j44]Anand Kumar, Karan Singh, Mohd Shariq, Chhagan Lal, Mauro Conti, Ruhul Amin, Shehzad Ashraf Chaudhry:
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems. Comput. Commun. 205: 147-157 (2023) - [j43]Mohammad Salar Arbabi, Chhagan Lal, Narasimha Raghavan Veeraragavan, Dusica Marijan, Jan F. Nygård, Roman Vitenberg:
A Survey on Blockchain for Healthcare: Challenges, Benefits, and Future Directions. IEEE Commun. Surv. Tutorials 25(1): 386-424 (2023) - [j42]Reza Mohammadi, Chhagan Lal, Mauro Conti:
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN. Int. J. Inf. Sec. 22(2): 367-379 (2023) - [j41]Meng Li, Yifei Chen, Chhagan Lal, Mauro Conti, Mamoun Alazab, Donghui Hu:
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain. IEEE Trans. Dependable Secur. Comput. 20(1): 225-241 (2023) - [j40]Meng Li, Yifei Chen, Chhagan Lal, Mauro Conti, Fabio Martinelli, Mamoun Alazab:
Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts. IEEE Trans. Dependable Secur. Comput. 20(4): 2849-2866 (2023) - [j39]Meng Li, Yifei Chen, Liehuang Zhu, Zijian Zhang, Jianbing Ni, Chhagan Lal, Mauro Conti:
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems. IEEE Trans. Dependable Secur. Comput. 20(4): 3002-3018 (2023) - [j38]Meng Li, Jianbo Gao, Zijian Zhang, Liehuang Zhu, Chhagan Lal, Mauro Conti, Mamoun Alazab:
Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion. IEEE Trans. Veh. Technol. 72(4): 5139-5151 (2023) - [j37]Amin Nazari, Mojtaba Kordabadi, Reza Mohammadi, Chhagan Lal:
EQRSRL: an energy-aware and QoS-based routing schema using reinforcement learning in IoMT. Wirel. Networks 29(7): 3239-3253 (2023) - [j36]Saurabh Rana, Dheerendra Mishra, Chhagan Lal, Mauro Conti:
Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing. Wirel. Pers. Commun. 131(2): 1295-1312 (2023) - 2022
- [j35]Reza Mohammadi, Chhagan Lal, Mauro Conti, Lokesh Sharma:
Software defined network-based HTTP flooding attack defender. Comput. Electr. Eng. 101: 108019 (2022) - [j34]Mohd Shariq, Karan Singh, Chhagan Lal, Mauro Conti, Tayyab Ali Khan:
ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags. Comput. Networks 217: 109360 (2022) - [j33]Dusica Marijan, Chhagan Lal:
Blockchain verification and validation: Techniques, challenges, and research directions. Comput. Sci. Rev. 45: 100492 (2022) - [j32]Meng Li, Yifei Chen, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti:
Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks. IEEE Trans. Dependable Secur. Comput. 19(2): 1133-1148 (2022) - [j31]Meng Li, Yifei Chen, Neeraj Kumar, Chhagan Lal, Mauro Conti, Mamoun Alazab:
Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks. IEEE Trans. Green Commun. Netw. 6(3): 1267-1275 (2022) - [j30]Meng Li, Liehuang Zhu, Zijian Zhang, Chhagan Lal, Mauro Conti, Mamoun Alazab:
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack. IEEE/ACM Trans. Netw. 30(5): 2060-2073 (2022) - [c18]Meng Li, Mingwei Zhang, Jianbo Gao, Chhagan Lal, Mauro Conti, Mamoun Alazab:
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud. ICICS 2022: 261-280 - [c17]Meng Li, Jianbo Gao, Zijian Zhang, Chaoping Fu, Chhagan Lal, Mauro Conti:
Graph Encryption for Shortest Path Queries with k Unsorted Nodes. TrustCom 2022: 89-96 - 2021
- [j29]Meng Li, Chhagan Lal, Mauro Conti, Donghui Hu:
LEChain: A blockchain-based lawful evidence management scheme for digital forensics. Future Gener. Comput. Syst. 115: 406-420 (2021) - [j28]Gulshan Kumar, Rahul Saha, Chhagan Lal, Mauro Conti:
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications. Future Gener. Comput. Syst. 120: 13-25 (2021) - [j27]Meng Li, Liehuang Zhu, Zijian Zhang, Chhagan Lal, Mauro Conti, Fabio Martinelli:
Privacy for 5G-Supported Vehicular Networks. IEEE Open J. Commun. Soc. 2: 1935-1956 (2021) - [j26]Nagarathna Ravi, S. Mercy Shalinie, Chhagan Lal, Mauro Conti:
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller. IEEE Trans. Netw. Serv. Manag. 18(1): 745-759 (2021) - [j25]Meng Li, Liehuang Zhu, Zijian Zhang, Chhagan Lal, Mauro Conti, Mamoun Alazab:
Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain. IEEE Trans. Netw. Serv. Manag. 18(4): 4434-4449 (2021) - [c16]Yifei Chen, Meng Li, Shuli Zheng, Chhagan Lal, Mauro Conti:
Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services. STM 2021: 43-61 - [i7]Chhagan Lal, Dusica Marijan:
Blockchain Testing: Challenges, Techniques, and Research Directions. CoRR abs/2103.10074 (2021) - 2020
- [j24]Wafa Ben Jaballah, Mauro Conti, Chhagan Lal:
Security and design requirements for software-defined VANETs. Comput. Networks 169: 107099 (2020) - [j23]Muhammad Hassan, Mauro Conti, Chhagan Lal:
NC based DAS-NDN: Network Coding for robust Dynamic Adaptive Streaming over NDN. Comput. Networks 174: 107222 (2020) - [j22]Mauro Conti, Chhagan Lal:
Context-based Co-presence detection techniques: A survey. Comput. Secur. 88 (2020) - [j21]Pallavi Kaliyar, Wafa Ben Jaballah, Mauro Conti, Chhagan Lal:
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks. Comput. Secur. 94: 101849 (2020) - [j20]Mauro Conti, Ankit Gangwal, Muhammad Hassan, Chhagan Lal, Eleonora Losiouk:
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions. IEEE Commun. Surv. Tutorials 22(3): 2104-2129 (2020) - [j19]Mauro Conti, Pallavi Kaliyar, Chhagan Lal:
A robust multicast communication protocol for Low power and Lossy networks. J. Netw. Comput. Appl. 164: 102675 (2020) - [j18]Meng Li, Donghui Hu, Chhagan Lal, Mauro Conti, Zijian Zhang:
Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things. IEEE Trans. Ind. Informatics 16(10): 6564-6574 (2020) - [j17]Anshu S. Anand, Mauro Conti, Pallavi Kaliyar, Chhagan Lal:
TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks. Wirel. Networks 26(4): 2449-2463 (2020) - [j16]Sarada Prasad Gochhayat, Chhagan Lal, Lokesh Sharma, D. P. Sharma, Deepak Gupta, Jose Antonio Marmolejo Saucedo, Utku Kose:
Reliable and secure data transfer in IoT networks. Wirel. Networks 26(8): 5689-5702 (2020) - [j15]Lokesh Sharma, Chhagan Lal, Pallavi Kaliyar, D. P. Sharma:
Mobility-Aware and Radio Characteristics Enabled Routing for Video Streaming over MANETs. Wirel. Pers. Commun. 110(4): 1795-1824 (2020) - [c15]Mohit Kumar Ahuja, Mohamed-Bachir Belaid, Pierre Bernabé, Mathieu Collet, Arnaud Gotlieb, Chhagan Lal, Dusica Marijan, Sagar Sen, Aizaz Sharif, Helge Spieker:
Opening the software engineering toolbox for the assessment of trustworthy AI. NeHuAI@ECAI 2020: 67-70 - [c14]Yifei Chen, Meng Li, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti:
One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud. ICICS 2020: 350-365 - [i6]Mohit Kumar Ahuja, Mohamed-Bachir Belaid, Pierre Bernabé, Mathieu Collet, Arnaud Gotlieb, Chhagan Lal, Dusica Marijan, Sagar Sen, Aizaz Sharif, Helge Spieker:
Opening the Software Engineering Toolbox for the Assessment of Trustworthy AI. CoRR abs/2007.07768 (2020)
2010 – 2019
- 2019
- [j14]Balu Deokate, Chhagan Lal, Denis Trcek, Mauro Conti:
Mobility-aware cross-layer routing for peer-to-peer networks. Comput. Electr. Eng. 73: 209-226 (2019) - [j13]Ajay Nehra, Meenakshi Tripathi, Manoj Singh Gaur, Ramesh Babu Battula, Chhagan Lal:
SLDP: A secure and lightweight link discovery protocol for software defined networking. Comput. Networks 150: 102-116 (2019) - [j12]Mauro Conti, Muhammad Hassan, Chhagan Lal:
BlockAuth: BlockChain based distributed producer authentication in ICN. Comput. Networks 164 (2019) - [j11]Mauro Conti, Pallavi Kaliyar, Chhagan Lal:
CENSOR: Cloud-enabled secure IoT architecture over SDN paradigm. Concurr. Comput. Pract. Exp. 31(8) (2019) - [j10]Pallavi Kaliyar, Chhagan Lal, C. M. Choudhary, Lokesh Sharma:
Multi-constraint Zigbee routing to prolong lifetime of mobile wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 31(4): 244-254 (2019) - [j9]Reza Mohammadi, Mauro Conti, Chhagan Lal, Satish C. Kulhari:
SYN-Guard: An effective counter for SYN flooding attack in software-defined networking. Int. J. Commun. Syst. 32(17) (2019) - [j8]Ajay Nehra, Meenakshi Tripathi, Manoj Singh Gaur, Ramesh Babu Battula, Chhagan Lal:
TILAK: A token-based prevention approach for topology discovery threats in SDN. Int. J. Commun. Syst. 32(17) (2019) - [j7]Mauro Conti, Chhagan Lal, Reza Mohammadi, Umashankar Rawat:
Lightweight solutions to counter DDoS attacks in software defined networking. Wirel. Networks 25(5): 2751-2768 (2019) - [p1]Mauro Conti, Pallavi Kaliyar, Chhagan Lal:
Secure Machine to Machine Communication in Industrial Internet of Things. Security and Privacy Trends in the Industrial Internet of Thing 2019: 199-219 - [i5]Mauro Conti, Ankit Gangwal, Muhammad Hassan, Chhagan Lal, Eleonora Losiouk:
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions. CoRR abs/1903.07446 (2019) - [i4]Mauro Conti, Pallavi Kaliyar, Chhagan Lal:
Reliable Group Communication Protocol for Internet of Things. CoRR abs/1904.04542 (2019) - [i3]Wafa Ben Jaballah, Mauro Conti, Chhagan Lal:
A Survey on Software-Defined VANETs: Benefits, Challenges, and Future Directions. CoRR abs/1904.04577 (2019) - 2018
- [j6]Mauro Conti, Ralph E. Droms, Muhammad Hassan, Chhagan Lal:
Fair-RTT-DAS: A robust and efficient dynamic adaptive streaming over ICN. Comput. Commun. 129: 209-225 (2018) - [j5]Mauro Conti, Sandeep Kumar E, Chhagan Lal, Sushmita Ruj:
A Survey on Security and Privacy Issues of Bitcoin. IEEE Commun. Surv. Tutorials 20(4): 3416-3452 (2018) - [j4]Prashant Kumar, Meenakshi Tripathi, Ajay Nehra, Mauro Conti, Chhagan Lal:
SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN. IEEE Trans. Netw. Serv. Manag. 15(4): 1545-1559 (2018) - [j3]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti:
Enhancing QoE for video streaming in MANETs via multi-constraint routing. Wirel. Networks 24(1): 235-256 (2018) - [i2]Mauro Conti, Chhagan Lal:
A Survey on Context-based Co-presence Detection Techniques. CoRR abs/1808.03320 (2018) - 2017
- [c13]Mauro Conti, Pallavi Kaliyar, Chhagan Lal:
REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks. ARES 2017: 84:1-84:8 - [c12]Reza Mohammadi, Reza Javidan, Manijeh Keshtgari, Mauro Conti, Chhagan Lal:
Practical extensions to countermeasure DoS attacks in software defined networking. NFV-SDN 2017: 1-6 - [i1]Mauro Conti, Sandeep Kumar E, Chhagan Lal, Sushmita Ruj:
A Survey on Security and Privacy Issues of Bitcoin. CoRR abs/1706.00916 (2017) - 2016
- [c11]Lokesh Sharma, Chhagan Lal, D. P. Sharma:
Improving QoE Using Link Stability for Video Streaming in MANETs. ADHOC-NOW 2016: 339-353 - 2015
- [j2]Vijay Laxmi, Chhagan Lal, Manoj Singh Gaur, Deepanshu Mehta:
JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET. J. Inf. Secur. Appl. 22: 99-112 (2015) - [j1]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur, Seok-Bum Ko:
Bandwidth-aware routing and admission control for efficient video streaming over MANETs. Wirel. Networks 21(1): 95-114 (2015) - 2014
- [c10]Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, Chhagan Lal:
LSMRP: Link stability based multicast routing protocol in MANETs. IC3 2014: 254-259 - [c9]Nishant Garg, Kuldeep Pareek, Manoj Singh Gaur, Vijay Laxmi, Chhagan Lal:
Analysis of Identity Forging Attack in MANETs. SIN 2014: 441 - 2013
- [c8]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur:
QoS-aware routing for transmission of H.264/SVC encoded video traffic over MANETs. APCC 2013: 104-109 - [c7]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur:
Video streaming over MANETs: Testing and analysis using real-time emulation. APCC 2013: 190-195 - [c6]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur:
An adaptive cross-layer routing protocol for delay-sensitive applications over MANETs. ICACCI 2013: 610-615 - [c5]Vijay Laxmi, Deepanshu Mehta, Manoj Singh Gaur, Parvez Faruki, Chhagan Lal:
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks. SIN 2013: 189-195 - 2012
- [c4]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur:
A Node-Disjoint Multipath Routing Method Based on AODV Protocol for MANETs. AINA 2012: 399-405 - [c3]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur:
A rate adaptive and multipath routing protocol to support video streaming in MANETs. ICACCI 2012: 262-268 - 2011
- [c2]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur:
Analysis of a Traffic Classification Scheme for QoS Provisioning over MANETs. ACC (2) 2011: 452-459 - [c1]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur:
A Rate Adaptation Scheme to Support QoS for H.264/SVC Encoded Video Streams over MANETs. ACN 2011: 86-95
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint