Chandrashekhar Meshram, Mohammad S. Obaidat, Kuei-Fang Hsiao
An efficient
ID
‐based cryptographic technique using
IFP
and
GDLP
Chandrashekhar Meshram, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, Kailash W. Kalare, Sunil D. Bagde
Journal:
Security and Privacy
Volume 3,
Issue 5
(2020)
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem
Chandrashekhar Meshram, Mohammad S. Obaidat, Cheng-Chi Lee, Sarita Gajbhiye Meshram
Journal:
Soft Computing
Volume 24,
Issue 9
(2020),
p. 6531
A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography
Fan Wu, Lili Xu, Xiong Li, Saru Kumari, Marimuthu Karuppiah, Mohammad S. Obaidat
Journal:
IEEE Systems Journal
Volume 13,
Issue 3
(2019),
p. 2830
A Provably Secure Lightweight Subtree-Based Short Signature Scheme With Fuzzy User Data Sharing for Human-Centered IoT
Chandrashekhar Meshram, Ahmed Alsanad, Jitendra V. Tembhurne, Shailendra W. Shende, Kailash Wamanrao Kalare, Sarita Gajbhiye Meshram, Muhammad Azeem Akbar, Abdu Gumaei
Journal:
IEEE Access
Volume 9
(2021),
p. 3649
A quantum secure ID-based cryptographic encryption based on group rings
Gaurav Mittal, Sunil Kumar, Sandeep Kumar
Journal:
Sādhanā
Volume 47,
Issue 1
(2022)
An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps
Chandrashekhar Meshram, Rabha W. Ibrahim, Mohammad S. Obaidat, Balqies Sadoun, Sarita Gajbhiye Meshram, Jitendra V. Tembhurne
Journal:
Soft Computing
Volume 25,
Issue 14
(2021),
p. 8905
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Chun-Ta Li
Journal:
Soft Computing
Volume 23,
Issue 16
(2019),
p. 6937
An efficient online/offline ID-based short signature procedure using extended chaotic maps
Chandrashekhar Meshram, Chun-Ta Li, Sarita Gajbhiye Meshram
Journal:
Soft Computing
Volume 23,
Issue 3
(2019),
p. 747
An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Muhammad Khurram Khan
Journal:
Soft Computing
Volume 23,
Issue 24
(2019),
p. 13127
Anonymous certificateless multi-receiver encryption scheme for smart community management systems
Journal:
Soft Computing
Volume 24,
Issue 1
(2020),
p. 281
Chebyshev chaotic map-based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography
Chandrashekhar Meshram, Mohammad S. Obaidat, Sarita G. Meshram
Journal:
Security and Privacy
Volume 1,
Issue 1
(2018),
p. e12
Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs
Chandrashekhar Meshram, Pournima L. Powar, Mohammad S. Obaidat, Cheng‐Chi Lee, Sarita Gajbhiye Meshram
Journal:
IET Networks
Volume 7,
Issue 6
(2018),
p. 363
New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group
Chandrashekhar Meshram, Xiangxue Li
Journal:
Journal of Information and Optimization Sciences
Volume 39,
Issue 2
(2018),
p. 391
Security analysis of Game Changer Password System
Journal:
International Journal of Human-Computer Studies
Volume 126
(2019),
p. 44