Keyur Parmar

Orcid: 0000-0003-2012-0475

According to our database1, Keyur Parmar authored at least 15 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology.
Int. J. Inf. Sec., February, 2025

2024
PGASH: Provable group-based authentication scheme for Internet of Healthcare Things.
Peer Peer Netw. Appl., March, 2024

2023
A transformative shift toward blockchain-based IoT environments: Consensus, smart contracts, and future directions.
Secur. Priv., 2023

A systematic review of decentralized finance protocols.
Int. J. Intell. Networks, 2023

Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things.
Proceedings of the Information Systems Security - 19th International Conference, 2023

Privacy-preserving Authentication Scheme for VANETs using Blockchain Technology.
Proceedings of the 14th International Conference on Ambient Systems, 2023

Efficient Public Data Auditing Scheme for Healthcare Systems using ECC-Based Attribute-Based Signature in Cloud Storage.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2023

2022
Securing Cookies/Sessions Through Non-fungible Tokens.
Proceedings of the Database Systems for Advanced Applications. DASFAA 2022 International Workshops, 2022

2018
Malleable Cryptosystems and Their Applications in Wireless Sensor Networks.
Proceedings of the Computer and Network Security Essentials., 2018

2016
Malleability Resilient Concealed Data Aggregation in Wireless Sensor Networks.
Wirel. Pers. Commun., 2016

Concealed data aggregation in wireless sensor networks: A comprehensive survey.
Comput. Networks, 2016

2015
Hybrid Secure Data Aggregation in Wireless Sensor Networks.
Proceedings of the Cyber Physical Systems. Design, Modeling, and Evaluation, 2015

2014
Malleability Resilient Concealed Data Aggregation.
Proceedings of the Advances in Communication Networking, 2014

Aggregate MAC Based Authentication for Secure Data Aggregation in Wireless Sensor Networks.
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014

2012
A Novel Approach for Verifiable Secret Sharing by using a One Way Hash Function
CoRR, 2012


  Loading...