Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter

    Bitcoin Blockchain System: An Overview of Security and Privacy Aspects

    Apart from creating a billion-dollar worth of cryptocurrency ecosystem, Bitcoin revolutionized the whole domain of cryptocurrencies, and it largely influenced many other application areas (e.g., healthcare, su...

    Mauro Conti, Ankit Gangwal, Chhagan Lal, Sushmita Ruj in Blockchains (2024)

  2. No Access

    Chapter

    Blockchain-Based Distributed and Secure Digital Forensic Investigation Systems

    Lawful evidence management by law enforcement agencies during the Digital Forensics (DF) investigation is of supreme importance since it convicts suspects of crimes. Therefore, a secure and efficient evidence ...

    Mauro Conti, Gulshan Kumar, Chhagan Lal, Rahul Saha in Blockchains (2024)

  3. No Access

    Article

    Investigation of ultrafast carrier dynamics in curcumin dye for environment friendly dye-sensitized solar cell

    Natural dyes have been widely employed in the fabrication of dye-sensitized solar cells (DSSCs). DSSCs are favored for their cost-effective, and simple fabrication process relies on metal-based and organic dye...

    Govind Sharma, Saurabh K. Saini in Environmental Science and Pollution Resear… (2023)

  4. No Access

    Article

    EQRSRL: an energy-aware and QoS-based routing schema using reinforcement learning in IoMT

    Internet of Medical Thing (IoMT) is an emerging technology in healthcare that can be used to realize a wide variety of medical applications. It improves people’s quality of life and makes it easier to care for...

    Amin Nazari, Mojtaba Kordabadi, Reza Mohammadi, Chhagan Lal in Wireless Networks (2023)

  5. Article

    Advanced materials for sustainable energy and applications

    Chhagan Lal, Pankaj K. Jain, Vidyadhar Singh in Environmental Science and Pollution Resear… (2023)

  6. No Access

    Article

    Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing

    The Vehicular Cloud Computing (VCC) provides significant benefits (e.g., higher resource availability, and low communication latency) to vehicular applications. However, still there exists latency related issu...

    Saurabh Rana, Dheerendra Mishra, Chhagan Lal in Wireless Personal Communications (2023)

  7. No Access

    Article

    HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN

    Nowadays, the number of Distributed Denial of Service (DDoS) attacks is growing rapidly. The aim of these type of attacks is to make the prominent and critical services unavailable for legitimate users. HTTP f...

    Reza Mohammadi, Chhagan Lal, Mauro Conti in International Journal of Information Security (2023)

  8. No Access

    Chapter and Conference Paper

    Anomaly-Based DNN Model for Intrusion Detection in IoT and Model Explanation: Explainable Artificial Intelligence

    IoT has gained immense popularity recently with advancements in technologies and big data. IoT network is dynamically increasing with the addition of devices, and the big data is generated within the network, ...

    Bhawana Sharma, Lokesh Sharma, Chhagan Lal in Proceedings of Second International Confer… (2023)

  9. No Access

    Chapter and Conference Paper

    Feature Selection and Deep Learning Technique for Intrusion Detection System in IoT

    The Internet of Things (IoT) is gaining popularity nowadays as widely used in many fields including health care, home automation and industry. Large number of devices are connected in IoT networks, and the dev...

    Bhawana Sharma, Lokesh Sharma, Chhagan Lal in Proceedings of International Conference on… (2022)

  10. No Access

    Chapter and Conference Paper

    Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud

    Location-Based Services (LBSs) depend on a Service Provider (SP) to store data owners’ geospatial data and to process data users’ queries. For example, a Yelp user queries the SP to retrieve the k nearest Starbuc...

    Meng Li, Mingwei Zhang, Jianbo Gao, Chhagan Lal in Information and Communications Security (2022)

  11. No Access

    Article

    Hydrogenation properties and kinetic study of MgH2 - x wt% AC nanocomposites prepared by ball milling

    The high de-/hydrogenation temperature of magnesium hydride is still a challenge in solid-state hydrogen storage system for automobiles applications. To improve the hydrogenation properties of MgH2, we select act...

    Kanhaiya Chawla, Deepak Kumar Yadav in Environmental Science and Pollution Resear… (2021)

  12. No Access

    Article

    Catalytic effect on hydrogen de/absorption properties of MgH2 − x wt% MM (x = 0, 10, 20, 30) nanomaterials

    Reversible hydrogen storage in MgH2 under specified conditions is a possible way for the positive reception of hydrogen economy, in which the developments of cheap and highly efficient catalysts are the major cha...

    Deepak Kumar Yadav, Kanhaiya Chawla in Environmental Science and Pollution Resear… (2021)

  13. No Access

    Chapter and Conference Paper

    Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services

    Ride-Hailing Service (RHS) has motivated the rise of innovative transportation services. It enables riders to hail a cab or private vehicle at the roadside by sending a ride request to the Ride-Hailing Service...

    Yifei Chen, Meng Li, Shuli Zheng, Chhagan Lal, Mauro Conti in Security and Trust Management (2021)

  14. No Access

    Article

    Reliable and secure data transfer in IoT networks

    With the rapid technological improvements in mobile devices and their inclusion in Internet of Things (IoT), secure key management becomes mandatory to ensure security of information exchange. For instance, Io...

    Sarada Prasad Gochhayat, Chhagan Lal, Lokesh Sharma, D. P. Sharma in Wireless Networks (2020)

  15. No Access

    Article

    TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks

    Internet of Things (IoT) employs a large number of sensors and actuators to collect and act upon data for its smart functionalities. These devices are considered as a part of the Low-power and Lossy Networks d...

    Anshul Anand, Mauro Conti, Pallavi Kaliyar, Chhagan Lal in Wireless Networks (2020)

  16. No Access

    Article

    Mobility-Aware and Radio Characteristics Enabled Routing for Video Streaming over MANETs

    Providing an adequate level of quality-of-experience (QoE) for multimedia applications in mobile ad-hoc networks (MANETs) is a challenging task due to its environmental characteristics, such as dynamic network...

    Lokesh Sharma, Chhagan Lal, Pallavi Kaliyar in Wireless Personal Communications (2020)

  17. No Access

    Chapter and Conference Paper

    One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud

    Location-based services (LBSs) are widely deployed in commercial services. These services always depend on a service provider, e.g., a cloud server, to store the enormous amounts of geospatial data and to proc...

    Yifei Chen, Meng Li, Shuli Zheng, Donghui Hu in Information and Communications Security (2020)

  18. No Access

    Article

    Lightweight solutions to counter DDoS attacks in software defined networking

    A distributed denial of service (DDoS) attack on any of the major components (e.g., controller, switches, and southbound channel) of software defined networking (SDN) architecture is a critical security threat...

    Mauro Conti, Chhagan Lal, Reza Mohammadi, Umashankar Rawat in Wireless Networks (2019)

  19. No Access

    Chapter

    Secure Machine to Machine Communication in Industrial Internet of Things

    In todays world, Internet of Things (IoT), is an emerging technology, where many smart devices are connected with each other. The rapidly growing deployment of IoT in real-world applications and the advancement i...

    Mauro Conti, Pallavi Kaliyar, Chhagan Lal in Security and Privacy Trends in the Industr… (2019)

  20. No Access

    Chapter and Conference Paper

    Enhancing QoS for Multimedia Services Using Mobility-Aware Bandwidth Estimation Algorithm in MANETs

    Over the years, a large array of multimedia services started using mobile ad hoc networks (MANETs) due to its attractive features such as low-cost quick deployment, node mobility, and distributed networking. H...

    Lokesh Sharma, Chhagan Lal, Devi Prasad Sharma in Optical and Wireless Technologies (2018)

previous disabled Page of 2