Sankita J. Patel
According to our database1,
Sankita J. Patel
authored at least 28 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks.
Clust. Comput., September, 2024
A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture.
Clust. Comput., April, 2024
A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier.
Concurr. Comput. Pract. Exp., 2024
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024
2023
Homomorphic cryptosystem-based secure data processing model for edge-assisted IoT healthcare systems.
Internet Things, July, 2023
SE-LAKAF: Security enhanced lightweight authentication and key agreement framework for smart grid network.
Peer Peer Netw. Appl., May, 2023
Dynamically scalable privacy-preserving authentication protocol for distributed IoT based healthcare service providers.
Wirel. Networks, April, 2023
Key-aggregate searchable encryption with multi-user authorization and keyword untraceability for distributed IoT healthcare systems.
Trans. Emerg. Telecommun. Technol., April, 2023
On prevention of attribute disclosure and identity disclosure against insider attack in collaborative social network data publishing.
Int. J. Bus. Intell. Data Min., 2023
2022
Privacy-preserving collaborative social network data publishing against colluding data providers.
Int. J. Inf. Comput. Secur., 2022
A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing.
Computing, 2022
2021
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2021
Securing fingerprint templates by enhanced minutiae-based encoding scheme in Fuzzy Commitment.
IET Inf. Secur., 2021
Privacy Preserving Scalable Authentication Protocol with Partially Trusted Third Party for Distributed Internet-of-Things.
Proceedings of the 18th International Conference on Security and Cryptography, 2021
2020
Design of secure authentication protocol for dynamic user addition in distributed Internet-of-Things.
Comput. Networks, 2020
A Semi-automated Approach to Generate an Adaptive Quality Attribute Relationship Matrix.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2020
2019
Proceedings of the Information Security Practice and Experience, 2019
A Novel k-Anonymization Approach to Prevent Insider Attack in Collaborative Social Network Data Publishing.
Proceedings of the Information Systems Security - 15th International Conference, 2019
Proceedings of the 2019 2nd International Conference on Geoinformatics and Data Analysis, 2019
A Context-Aware Approach to Enhance Service Utility for Location Privacy in Internet of Things.
Proceedings of the Advances in Computing and Data Sciences, 2019
2018
2017
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017
2016
Proceedings of the Joint Proceedings of REFSQ-2016 Workshops, 2016
2014
Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Verifiable Secret Sharing Scheme.
Int. J. Distributed Syst. Technol., 2014
2013
Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Zero Knowledge Proof.
Proceedings of the Distributed Computing and Internet Technology, 2013
2012
Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks
CoRR, 2012
An Efficient Approach for Privacy Preserving Distributed K-Means Clustering Based on Shamir's Secret Sharing Scheme.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012
2009
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009