An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks TY Wu, Z Lee, MS Obaidat, S Kumari, S Kumar, CM Chen IEEE Access 8, 28096-28108, 2020 | 92 | 2020 |
Fake news detection using deep learning models: A novel approach S Kumar, R Asthana, S Upadhyay, N Upreti, M Akbar Transactions on Emerging Telecommunications Technologies 31 (2), e3767, 2020 | 77 | 2020 |
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System TY Wu, T Wang, YQ Lee, W Zheng, S Kumari, S Kumar Security and Communication Networks 2021, 2021 | 37 | 2021 |
An Improved Blockchain-Based Authentication Protocol for IoT Network Management M Yavari, M Safkhani, S Kumari, S Kumar, CM Chen Security and Communication Networks 2020, 2020 | 34 | 2020 |
Performance Evaluation of DSR, AODV and DSDV Routing Protocol for Wireless Adhoc Network M Gupta, S Kumar 2015 IEEE International Conference on Computational Intelligence …, 2015 | 25 | 2015 |
Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks K Renuka, S Kumar, S Kumari, CM Chen Sensors 19 (21), 4625, 2019 | 24 | 2019 |
Forward Privacy Preservation in IoT-Enabled Healthcare Systems K Wang, CM Chen, Z Tie, M Shojafar, S Kumar, S Kumari IEEE transactions on industrial informatics 18 (3), 1991-1999, 2021 | 22 | 2021 |
A review of comparative analysis of TCP variants for congestion control in network P Chaudhary, S Kumar International Journal of Computer Applications 160 (8), 2017 | 22 | 2017 |
A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks TY Wu, L Yang, Z Lee, SC Chu, S Kumari, S Kumar Wireless Communications and Mobile Computing 2021, 2021 | 20 | 2021 |
Energy‐efficient fog computing in Internet of Things based on Routing Protocol for Low‐Power and Lossy Network with Contiki A Kumar, S Sharma, N Goyal, SK Gupta, S Kumari, S Kumar International Journal of Communication Systems 35 (4), e5049, 2022 | 17 | 2022 |
A verifiable hidden policy CP‐ABE with decryption testing scheme and its application in VANET Y Zhao, X Zhang, X Xie, Y Ding, S Kumar Transactions on Emerging Telecommunications Technologies 33 (5), e3785, 2022 | 16 | 2022 |
Transfer reinforcement learning-based road object detection in next generation IoT domain K Wang, CM Chen, MS Hossain, G Muhammad, S Kumar, S Kumari Computer Networks 193, 108078, 2021 | 16 | 2021 |
RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications M Safkhani, N Bagheri, S Kumari, H Tavakoli, S Kumar, J Chen IEEE Access 8, 200851-200862, 2020 | 16 | 2020 |
Lightweight authentication protocol in edge-based smart grid environment CM Chen, L Chen, Y Huang, S Kumar, JMT Wu EURASIP Journal on Wireless Communications and Networking 2021 (1), 1-18, 2021 | 15 | 2021 |
Proxy re‐encryption with equality test for secure data sharing in Internet of Things‐based healthcare systems W Li, C Jin, S Kumari, H Xiong, S Kumar Transactions on Emerging Telecommunications Technologies, e3986, 2020 | 15 | 2020 |
Comparative study of TCP variants for congestion control in wireless network P Chaudhary, S Kumar 2017 International conference on computing, communication and automation …, 2017 | 15 | 2017 |
An efficient certificateless public key encryption with equality test toward internet of vehicles Y Zhao, Y Hou, Y Chen, S Kumar, F Deng Transactions on Emerging Telecommunications Technologies 33 (5), e3812, 2022 | 12 | 2022 |
LSTM Network for Transportation Mode Detection S Kumar, A Damaraju, A Kumar, S Kumari, CM Chen Journal of Internet Technology 22 (4), 891-902, 2021 | 12 | 2021 |
Intelligent traffic controller S Kumar, A Baliyan, A Tiwari, AK Tripathi, B Jaiswal International Journal of Information Technology, 1-13, 2019 | 12 | 2019 |
Practical Identity Based Online/Off-Line Signcryption Scheme for Secure Communication in Internet of Things VS Naresh, S Reddi, S Kumari, VVLD Allavarpu, S Kumar, MH Yang IEEE Access 9, 21267-21278, 2021 | 10 | 2021 |