LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment R Chaudhary, A Jindal, GS Aujla, N Kumar, AK Das, N Saxena IEEE Communications Magazine 56 (4), 24-32, 2018 | 169 | 2018 |
Authentication and Authorization Scheme for Various User-Roles and Devices in Smart Grid N Saxena, B Choi, R Lu IEEE Transactions on Information Forensics and Security, 2016 | 164 | 2016 |
Password-protected secret sharing A Bagherzandi, S Jarecki, N Saxena, Y Lu Proceedings of the 18th ACM conference on Computer and Communications …, 2011 | 163 | 2011 |
Estimating age privacy leakage in online social networks R Dey, C Tang, K Ross, N Saxena 2012 proceedings ieee infocom, 2836-2840, 2012 | 150 | 2012 |
Impact and key challenges of insider threats on organizations and critical businesses N Saxena, E Hayes, E Bertino, P Ojo, KKR Choo, P Burnap Electronics 9 (9), 1460, 2020 | 147 | 2020 |
Network security and privacy challenges in smart vehicle-to-grid N Saxena, S Grijalva, V Chukwuka, AV Vasilakos IEEE Wireless Communications 24 (4), 88-98, 2017 | 142 | 2017 |
Secure proximity detection for NFC devices based on ambient sensor data T Halevi, D Ma, N Saxena, T Xiang Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 139 | 2012 |
Security and Privacy in IoT Smart Healthcare SM Karunarathne, N Saxena, MK Khan IEEE Internet Computing, 2021 | 114 | 2021 |
Smart grid cyber-physical situational awareness of complex operational technology attacks: A review MN Nafees, N Saxena, A Cardenas, S Grijalva, P Burnap ACM Computing Surveys 55 (10), 1-36, 2023 | 110 | 2023 |
Location-aware and safer cards: enhancing RFID security and privacy via location sensing D Ma, AK Prasad, N Saxena, T Xiang Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012 | 103 | 2012 |
Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi 2014 IEEE International Conference on Pervasive Computing and Communications …, 2014 | 100 | 2014 |
Future industry internet of things with zero-trust security S Li, M Iqbal, N Saxena Information Systems Frontiers, 1-14, 2022 | 96 | 2022 |
Authentication scheme for flexible charging and discharging of mobile vehicles in the V2G networks N Saxena, BJ Choi IEEE Transactions on Information Forensics and Security 11 (7), 1438-1452, 2016 | 95 | 2016 |
Image forgery detection using deep learning by recompressing images SS Ali, II Ganapathi, NS Vu, SD Ali, N Saxena, N Werghi Electronics 11 (3), 403, 2022 | 90 | 2022 |
EasySMS: A Protocol for End-to-End Secure Transmission of SMS N Saxena, NS Chaudhari IEEE Transactions on Information Forensic & Securi, 2014 | 82 | 2014 |
Pharmacrypt: Blockchain for critical pharmaceutical industry to counterfeit drugs N Saxena, I Thomas, P Gope, P Burnap, N Kumar Computer 53 (7), 29-44, 2020 | 81 | 2020 |
State of the art authentication, access control, and secure integration in smart grid N Saxena, BJ Choi Energies 8 (10), 11883-11915, 2015 | 80 | 2015 |
A provably secure authentication scheme for RFID-enabled UAV applications P Gope, O Millwood, N Saxena Computer Communications 166, 19-25, 2021 | 59 | 2021 |
Authentication protocol for an IoT-enabled LTE network N Saxena, S Grijalva, NS Chaudhari ACM Transactions on Internet Technology (TOIT) 16 (4), 1-20, 2016 | 57 | 2016 |
Teacher education NR Saxena, BK Mishra, RK Mohanty Lall Book Depot, Meerut, 1998 | 51 | 1998 |