Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Ashish Tomar"'
Publikováno v:
Medical Journal of Dr. D.Y. Patil University, Vol 10, Iss 2, Pp 216-217 (2017)
Externí odkaz:
https://doaj.org/article/0ce0ec318ad847a588df1157edce5311
Publikováno v:
Journal of Big Data Technology and Business Analytics. 1:23-26
Quantum computing is a cutting-edge computing technique based on quantum physics. Quantum Computers have low energy consumption and escalated speed over traditional computers. This paper will help you understand how information is implemented and act
Publikováno v:
Journal of Cyber Security, Privacy Issues and Challenges. 1:22-27
Wireless Sensor Networks (WSNs) are a type of network that consists of thousands or even millions of sensor nodes dispersed around the region to be monitored, depending on the application. Since the network of nodes comprises of minimal cost nodes wi
Autor:
Ashish Tomar, Sachin Tripathi
Publikováno v:
Peer-to-Peer Networking and Applications. 15:1733-1756
Autor:
Ashish Tomar, Sachin Tripathi
Publikováno v:
Cluster Computing. 25:451-468
In recent times, the research works on the integration of fog computing with blockchain to address the issues such as higher latency, single point of failure, and centralization have expanded considerably. However, only a few works have been done foc
Nowadays, the research work on integration of Blockchain in IoT based Healthcare System is highly focused in order to make the system decentralised, transparent and immutable. However, there are very few works that have integrated Blockchain for auth
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a87901c2a9cd6d96bd8f471fb8ba3021
https://doi.org/10.21203/rs.3.rs-1996550/v1
https://doi.org/10.21203/rs.3.rs-1996550/v1
A Blockchain-Based Certificateless Aggregate Signature Scheme for Fog-Enabled Smart Grid Environment
Publikováno v:
IEEE Transactions on Green Communications and Networking. :1-1
Autor:
Ashish Tomar, Joydip Dhar
Publikováno v:
International Journal of Information Technology. 11:691-696
In multi-server environment, many authentication algorithms have been proposed. Most of the algorithms are based on registration of client and server on the single control server. Recently Gupta and Dhar (Wirel Pers Commun 87(1):225–244, 2016) prop
Autor:
Ashish Tomar, Joydip Dhar
Publikováno v:
Wireless Personal Communications. 107:351-372
For providing strong mutual authentication in a multi-server environment many algorithms have been proposed. Most of the algorithms provide mutual authentication between client and multiple servers by using single control server for registration. In