Follow
Nishant Doshi
Nishant Doshi
Pandit Deendayal Energy University, Gandhinagar
Verified email at acm.org
Title
Cited by
Cited by
Year
Human activity recognition: A survey
C Jobanputra, J Bavishi, N Doshi
Procedia Computer Science 155, 698-703, 2019
2782019
Security and privacy issues in cloud, fog and edge computing
S Parikh, D Dave, R Patel, N Doshi
Procedia Computer Science 160, 734-739, 2019
1092019
A novel MQTT security framework in generic IoT model
C Patel, N Doshi
Procedia Computer Science 171, 1399-1408, 2020
732020
Voice-controlled autonomous vehicle using IoT
S Sachdev, J Macwan, C Patel, N Doshi
Procedia Computer Science 160, 712-717, 2019
642019
Blockchain-based IoT: A survey
R Thakore, R Vaghashiya, C Patel, N Doshi
Procedia computer science 155, 704-709, 2019
602019
A survey on blockchain technology and its proposed solutions
D Dave, S Parikh, R Patel, N Doshi
Procedia Computer Science 160, 740-745, 2019
502019
Security challenges in IoT cyber world
C Patel, N Doshi
Security in smart cities: models, applications, and challenges, 171-191, 2019
482019
Fully secure ciphertext policy attribute‐based encryption with constant length ciphertext and faster decryption
N Doshi, DC Jinwala
Security and Communication Networks 7 (11), 1988-2002, 2014
462014
A survey of smart city infrastructure via case study on New York
J Shah, J Kothari, N Doshi
Procedia Computer Science 160, 702-705, 2019
432019
Social implications of smart cities
Y Patel, N Doshi
Procedia Computer Science 155, 692-697, 2019
432019
Analysis of robust weed detection techniques based on the Internet of Things (IoT)
F Dankhara, K Patel, N Doshi
Procedia Computer Science 160, 696-701, 2019
392019
A CNN-BiLSTM based Approach for Detection of SQL Injection Attacks
N Gandhi, J Patel, R Sisodiya, N Doshi, S Mishra
2021 International Conference on Computational Intelligence and Knowledge …, 2021
362021
Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext
N Doshi, D Jinwala
International Conference on Advanced Computing, Networking and Security, 515-523, 2011
362011
A Comparative study of applications of Game Theory in Cyber Security and Cloud Computing.
V Kakkad, H Shah, R Patel, N Doshi
Procedia Computer Science 155, 680-685, 2019
342019
An analytical study of biometric based remote user authentication schemes using smart cards
T Limbasiya, N Doshi
Computers & Electrical Engineering 59, 305-321, 2017
342017
Python: the most advanced programming language for computer science applications
AJ Dhruv, R Patel, N Doshi
Science and Technology Publications, Lda, 292-299, 2021
292021
Constant ciphertext length in multi-authority ciphertext policy attribute based encryption
N Doshi, D Jinwala
2011 2nd International Conference on Computer and Communication Technology …, 2011
262011
Secure lightweight key exchange using ECC for user-gateway paradigm
C Patel, N Doshi
IEEE Transactions on Computers 70 (11), 1789-1803, 2020
252020
Survey-pollution monitoring using IoT
J Arora, U Pandya, S Shah, N Doshi
Procedia Computer Science 155, 710-715, 2019
242019
Improving security in multi authority attribute based encryption with fast decryption
N Gorasia, RR Srikanth, N Doshi, J Rupareliya
Procedia Computer Science 79, 632-639, 2016
242016
The system can't perform the operation now. Try again later.
Articles 1–20