Chandrashekhar Meshram
Orcid: 0000-0003-2434-8928
According to our database1,
Chandrashekhar Meshram
authored at least 54 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
An efficient privacy-preserved authentication technique based on conformable fractional chaotic map for TMIS under smart homes environments.
J. Supercomput., January, 2024
Proceedings of the International Conference on Computer, 2024
An Efficient Provably Secure Identity-Based Authentication Technique for TMIS Under a Smart City Environment.
Proceedings of the International Conference on Communications, 2024
2023
An efficient certificateless group signcryption scheme using Quantum Chebyshev Chaotic Maps in HC-IoT environments.
J. Supercomput., October, 2023
An efficient provably secure verifier-based authentication protocol using fractional chaotic maps in telecare medicine information systems.
Soft Comput., May, 2023
An Efficient Anonymous Authentication Technique for TMIS under the Smart Home Environment.
Proceedings of the International Conference on Computer, 2023
A Robust Remote Client Password Authentication Technique for Smart Cities E-Governance Applications.
Proceedings of the International Conference on Communications, 2023
2022
An efficient authentication with key agreement procedure using Mittag-Leffler-Chebyshev summation chaotic map under the multi-server architecture.
J. Supercomput., 2022
An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric.
J. Supercomput., 2022
A Multi-Layer Perceptron (MLP)-Fire Fly Algorithm (FFA)-based model for sediment prediction.
Soft Comput., 2022
Performance Measurement System and Quality Management in Data-Driven Industry 4.0: A Review.
Sensors, 2022
Barriers of managing cloud outsource software development projects: a multivocal study.
Multim. Tools Appl., 2022
An Efficient Conformable Fractional Chaotic Map-Based Online/Offline IBSS Scheme for Provable Security in ROM.
Complex., 2022
CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique Based on Fractional Chaotic Maps.
IEEE Access, 2022
An Efficient Authentication Technique using Convolution Chebyshev Chaotic Maps for TMIS.
Proceedings of the International Conference on Communications, 2022
Proceedings of the International Conference on Communications, 2022
2021
Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function.
J. Supercomput., 2021
A comparative study between dynamic and soft computing models for sediment forecasting.
Soft Comput., 2021
An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps.
Soft Comput., 2021
A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment.
Soft Comput., 2021
A Lightweight Provably Secure Digital Short-Signature Technique Using Extended Chaotic Maps for Human-Centered IoT Systems.
IEEE Syst. J., 2021
An Efficient, Robust, and Lightweight Subtree-Based Three-Factor Authentication Procedure for Large-Scale DWSN in Random Oracle.
IEEE Syst. J., 2021
A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments.
Sensors, 2021
An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps.
Sensors, 2021
IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks.
IEEE Access, 2021
A Provably Secure Lightweight Subtree-Based Short Signature Scheme With Fuzzy User Data Sharing for Human-Centered IoT.
IEEE Access, 2021
An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS.
IEEE Access, 2021
An Effective Fair Off-Line Electronic Cash Protocol using Extended Chaotic Maps with Anonymity Revoking Trustee.
Proceedings of the International Conference on Communications, 2021
2020
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem.
Soft Comput., 2020
A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing.
Int. J. Commun. Syst., 2020
OOS-SSS: An Efficient Online/Offline Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor Network.
IEEE Access, 2020
Multicriteria Decision Making Taxonomy of Cloud-Based Global Software Development Motivators.
IEEE Access, 2020
An Efficient Robust Lightweight Remote User Authentication Protocol using Extended Chaotic Maps.
Proceedings of the International Conference on Computer, 2020
Proceedings of the International Conference on Computer, 2020
Proceedings of the International Conference on Communications, 2020
2019
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem.
Soft Comput., 2019
An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment.
Soft Comput., 2019
An efficient online/offline ID-based short signature procedure using extended chaotic maps.
Soft Comput., 2019
River flow prediction using hybrid PSOGSA algorithm based on feed-forward neural network.
Soft Comput., 2019
Soft Comput., 2019
An Efficient EUF-ID-CMA Secure Identity-based Short Signature Scheme using Discrete Logarithm.
Proceedings of the 2019 International Conference on Computer, 2019
2018
Chebyshev chaotic map-based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography.
Secur. Priv., 2018
Int. J. Netw. Secur., 2018
IET Networks, 2018
2017
Soft Comput., 2017
Informatica, 2017
2015
An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem.
Inf. Process. Lett., 2015
Proceedings of the International Conference on Computer, 2015
2013
An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem.
Inf. Process. Lett., 2013
2012
Inf. Process. Lett., 2012
2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011