2019 International Conference on Computer, Information and Telecommunication Systems (CITS)
Chandrashekhar Meshram, Mohammad S. Obaidat, Kuei-Fang Hsiao
A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography
Fan Wu, Lili Xu, Xiong Li, Saru Kumari, Marimuthu Karuppiah, Mohammad S. Obaidat
Journal:
IEEE Systems Journal
Volume 13,
Issue 3
(2019),
p. 2830
A Provably Secure Lightweight Subtree-Based Short Signature Scheme With Fuzzy User Data Sharing for Human-Centered IoT
Chandrashekhar Meshram, Ahmed Alsanad, Jitendra V. Tembhurne, Shailendra W. Shende, Kailash Wamanrao Kalare, Sarita Gajbhiye Meshram, Muhammad Azeem Akbar, Abdu Gumaei
Journal:
IEEE Access
Volume 9
(2021),
p. 3649
A quantum secure ID-based cryptographic encryption based on group rings
Gaurav Mittal, Sunil Kumar, Sandeep Kumar
Journal:
Sādhanā
Volume 47,
Issue 1
(2022)
An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps
Chandrashekhar Meshram, Rabha W. Ibrahim, Mohammad S. Obaidat, Balqies Sadoun, Sarita Gajbhiye Meshram, Jitendra V. Tembhurne
Journal:
Soft Computing
Volume 25,
Issue 14
(2021),
p. 8905
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Chun-Ta Li
Journal:
Soft Computing
Volume 23,
Issue 16
(2019),
p. 6937
An efficient ID‐based cryptographic technique using IFP and GDLP
Chandrashekhar Meshram, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, Kailash W. Kalare, Sunil D. Bagde
Journal:
SECURITY AND PRIVACY
Volume 3,
Issue 5
(2020)
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem
Chandrashekhar Meshram, Mohammad S. Obaidat, Cheng-Chi Lee, Sarita Gajbhiye Meshram
Journal:
Soft Computing
Volume 24,
Issue 9
(2020),
p. 6531
An efficient online/offline ID-based short signature procedure using extended chaotic maps
Chandrashekhar Meshram, Chun-Ta Li, Sarita Gajbhiye Meshram
Journal:
Soft Computing
Volume 23,
Issue 3
(2019),
p. 747
An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Muhammad Khurram Khan
Journal:
Soft Computing
Volume 23,
Issue 24
(2019),
p. 13127
Anonymous certificateless multi-receiver encryption scheme for smart community management systems
Journal:
Soft Computing
Volume 24,
Issue 1
(2020),
p. 281
Chebyshev chaotic map‐based ID‐based cryptographic model using subtree and fuzzy‐entity data sharing for public key cryptography
Chandrashekhar Meshram, Mohammad S. Obaidat, Sarita G. Meshram
Journal:
SECURITY AND PRIVACY
Volume 1,
Issue 1
(2018)
Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs
Chandrashekhar Meshram, Pournima L. Powar, Mohammad S. Obaidat, Cheng‐Chi Lee, Sarita Gajbhiye Meshram
Journal:
IET Networks
Volume 7,
Issue 6
(2018),
p. 363
New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group
Chandrashekhar Meshram, Xiangxue Li
Journal:
Journal of Information and Optimization Sciences
Volume 39,
Issue 2
(2018),
p. 391
Security analysis of Game Changer Password System
Journal:
International Journal of Human-Computer Studies
Volume 126
(2019),
p. 44