Formal verification of secure evidence collection protocol using BAN logic and AVISPA PR Yogesh Procedia Computer Science 167, 1334-1344, 2020 | 52 | 2020 |
Network forensic investigation protocol to identify true origin of cyber crime RY Patil, SR Devane Journal of King Saud University-Computer and Information Sciences 34 (5 …, 2022 | 51 | 2022 |
A New Security Protocol Using Hybrid Cryptography Algorithms RYP Darshan Bhole , Aditi Mote International Journal of Computer Sciences and Engineering 4 (2), 18-22, 2016 | 32 | 2016 |
Management of IoT devices security using blockchain—a review G Pattewar, N Mahamuni, H Nikam, O Loka, R Patil Sentimental Analysis and Deep Learning: Proceedings of ICSADL 2021, 735-743, 2022 | 23 | 2022 |
Unmasking of source identity, a step beyond in cyber forensic RY Patil, SR Devane Proceedings of the 10th international conference on security of information …, 2017 | 23 | 2017 |
Backtracking tool root-tracker to identify true source of cyber crime PR Yogesh Procedia Computer Science 171, 1120-1128, 2020 | 22 | 2020 |
A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute‑based signcryption RY Patil International Journal of Information Technology, 2023 | 20 | 2023 |
A provably secure data sharing scheme for smart gas distribution grid using fog computing RY Patil, YH Patil, R Kachhoria, S Lonare International Journal of Information Technology 14 (6), 2927-2939, 2022 | 20 | 2022 |
Ensuring accountability in digital forensics with proxy re-encryption based chain of custody RY Patil, YH Patil, A Bannore, M Ranjanikar International Journal of Information Technology 16 (3), 1841-1853, 2024 | 19 | 2024 |
A rate limiting mechanism for defending against flooding based distributed denial of service attack RY Patil, L Ragha 2011 world congress on information and communication technologies, 182-186, 2011 | 19 | 2011 |
Primordial fingerprinting techniques from the perspective of digital forensic requirements PR Yogesh, SR Devane 2018 9th international conference on computing, communication and networking …, 2018 | 18 | 2018 |
Digital evidence management system for cybercrime investigation using proxy re-encryption and blockchain H Chougule, S Dhadiwal, M Lokhande, R Naikade, R Patil Procedia Computer Science 215, 71-77, 2022 | 15 | 2022 |
Identity-based signcryption scheme for medical cyber physical system in standard model RY Patil, YH Patil International Journal of Information Technology 14 (5), 2275-2283, 2022 | 13 | 2022 |
Hash Tree-Based Device Fingerprinting Technique for Network Forensic Investigation DSR Patil R.Y. Springer Lecture Notes in Electrical Engineering 672, 201-209, 2020 | 12 | 2020 |
Review on applications of blockchain for electronic health records systems S Deore, R Bachche, A Bichave, R Patil Second International Conference on Image Processing and Capsule Networks …, 2022 | 10 | 2022 |
A review of blockchain consensus algorithm M Borse, P Shendkar, Y Undre, A Mahadik, RY Patil Expert Clouds and Applications: Proceedings of ICOECA 2022, 415-426, 2022 | 9 | 2022 |
An efficient proxy signature–based authority delegation scheme for medical cyber physical systems A Bannore, RY Patil, SR Devane Cyber Security Threats and Challenges Facing Human Life, 13-23, 2022 | 8 | 2022 |
Achieving flatness: with video captcha, location tracking, selecting the honeywords N Patil, R Patil 2018 International Conference on Smart City and Emerging Technology (ICSCET …, 2018 | 8 | 2018 |
A dynamic rate limiting mechanism for flooding based distributed denial of service attack RY Patil, L Ragha Fourth International Conference on Advances in Recent Technologies in …, 2012 | 8 | 2012 |
A Blockchain and Proxy Re-encryption Based Approach for IoT Data Security: A Review RP Nachiket Mahamuni, Hrishikesh Nikam, Gaurav Pattewar, Omkar Loka 2nd International Conference on Emerging Technologies and Intelligent …, 2023 | 7* | 2023 |