Cited by 16
An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP

Chandrashekhar Meshram, Mohammad S. Obaidat, Kuei-Fang Hsiao
Journal:  (2019), p. 1
An efficient ID ‐based cryptographic technique using IFP and GDLP
Chandrashekhar Meshram, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, Kailash W. Kalare, Sunil D. Bagde
Journal:  Security and Privacy Volume 3, Issue 5 (2020)
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem
Chandrashekhar Meshram, Mohammad S. Obaidat, Cheng-Chi Lee, Sarita Gajbhiye Meshram
Journal:  Soft Computing Volume 24, Issue 9 (2020), p. 6531
A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography
Fan Wu, Lili Xu, Xiong Li, Saru Kumari, Marimuthu Karuppiah, Mohammad S. Obaidat
Journal:  IEEE Systems Journal Volume 13, Issue 3 (2019), p. 2830
A Provably Secure Lightweight Subtree-Based Short Signature Scheme With Fuzzy User Data Sharing for Human-Centered IoT
Chandrashekhar Meshram, Ahmed Alsanad, Jitendra V. Tembhurne, Shailendra W. Shende, Kailash Wamanrao Kalare, Sarita Gajbhiye Meshram, Muhammad Azeem Akbar, Abdu Gumaei
Journal:  IEEE Access Volume 9 (2021), p. 3649
A quantum secure ID-based cryptographic encryption based on group rings
Gaurav Mittal, Sunil Kumar, Sandeep Kumar
Journal:  Sādhanā Volume 47, Issue 1 (2022)
An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps
Chandrashekhar Meshram, Rabha W. Ibrahim, Mohammad S. Obaidat, Balqies Sadoun, Sarita Gajbhiye Meshram, Jitendra V. Tembhurne
Journal:  Soft Computing Volume 25, Issue 14 (2021), p. 8905
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Chun-Ta Li
Journal:  Soft Computing Volume 23, Issue 16 (2019), p. 6937
An efficient online/offline ID-based short signature procedure using extended chaotic maps
Chandrashekhar Meshram, Chun-Ta Li, Sarita Gajbhiye Meshram
Journal:  Soft Computing Volume 23, Issue 3 (2019), p. 747
An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Muhammad Khurram Khan
Journal:  Soft Computing Volume 23, Issue 24 (2019), p. 13127
Anonymous certificateless multi-receiver encryption scheme for smart community management systems
Lunzhi Deng
Journal:  Soft Computing Volume 24, Issue 1 (2020), p. 281
Chebyshev chaotic map-based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography
Chandrashekhar Meshram, Mohammad S. Obaidat, Sarita G. Meshram
Journal:  Security and Privacy Volume 1, Issue 1 (2018), p. e12
Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs
Chandrashekhar Meshram, Pournima L. Powar, Mohammad S. Obaidat, Cheng‐Chi Lee, Sarita Gajbhiye Meshram
Journal:  IET Networks Volume 7, Issue 6 (2018), p. 363
New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group
Chandrashekhar Meshram, Xiangxue Li
Journal:  Journal of Information and Optimization Sciences Volume 39, Issue 2 (2018), p. 391
Security analysis of Game Changer Password System
Boštjan Brumen
Journal:  International Journal of Human-Computer Studies Volume 126 (2019), p. 44
Pub. online: 17 Apr 2020      Type: Research Article      Open accessOpen Access
Journal:  Informatica Volume 31, Issue 3 (2020), pp. 459–479
   Abstract