Cited by 16
An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP

2019 International Conference on Computer, Information and Telecommunication Systems (CITS)
Chandrashekhar Meshram, Mohammad S. Obaidat, Kuei-Fang Hsiao
Conference:  (2019), p. 1
A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography
Fan Wu, Lili Xu, Xiong Li, Saru Kumari, Marimuthu Karuppiah, Mohammad S. Obaidat
Journal:  IEEE Systems Journal Volume 13, Issue 3 (2019), p. 2830
A Provably Secure Lightweight Subtree-Based Short Signature Scheme With Fuzzy User Data Sharing for Human-Centered IoT
Chandrashekhar Meshram, Ahmed Alsanad, Jitendra V. Tembhurne, Shailendra W. Shende, Kailash Wamanrao Kalare, Sarita Gajbhiye Meshram, Muhammad Azeem Akbar, Abdu Gumaei
Journal:  IEEE Access Volume 9 (2021), p. 3649
A quantum secure ID-based cryptographic encryption based on group rings
Gaurav Mittal, Sunil Kumar, Sandeep Kumar
Journal:  Sādhanā Volume 47, Issue 1 (2022)
An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps
Chandrashekhar Meshram, Rabha W. Ibrahim, Mohammad S. Obaidat, Balqies Sadoun, Sarita Gajbhiye Meshram, Jitendra V. Tembhurne
Journal:  Soft Computing Volume 25, Issue 14 (2021), p. 8905
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Chun-Ta Li
Journal:  Soft Computing Volume 23, Issue 16 (2019), p. 6937
An efficient ID‐based cryptographic technique using IFP and GDLP
Chandrashekhar Meshram, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, Kailash W. Kalare, Sunil D. Bagde
Journal:  SECURITY AND PRIVACY Volume 3, Issue 5 (2020)
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem
Chandrashekhar Meshram, Mohammad S. Obaidat, Cheng-Chi Lee, Sarita Gajbhiye Meshram
Journal:  Soft Computing Volume 24, Issue 9 (2020), p. 6531
An efficient online/offline ID-based short signature procedure using extended chaotic maps
Chandrashekhar Meshram, Chun-Ta Li, Sarita Gajbhiye Meshram
Journal:  Soft Computing Volume 23, Issue 3 (2019), p. 747
An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Muhammad Khurram Khan
Journal:  Soft Computing Volume 23, Issue 24 (2019), p. 13127
Anonymous certificateless multi-receiver encryption scheme for smart community management systems
Lunzhi Deng
Journal:  Soft Computing Volume 24, Issue 1 (2020), p. 281
Chebyshev chaotic map‐based ID‐based cryptographic model using subtree and fuzzy‐entity data sharing for public key cryptography
Chandrashekhar Meshram, Mohammad S. Obaidat, Sarita G. Meshram
Journal:  SECURITY AND PRIVACY Volume 1, Issue 1 (2018)
Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs
Chandrashekhar Meshram, Pournima L. Powar, Mohammad S. Obaidat, Cheng‐Chi Lee, Sarita Gajbhiye Meshram
Journal:  IET Networks Volume 7, Issue 6 (2018), p. 363
New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group
Chandrashekhar Meshram, Xiangxue Li
Journal:  Journal of Information and Optimization Sciences Volume 39, Issue 2 (2018), p. 391
Security analysis of Game Changer Password System
Boštjan Brumen
Journal:  International Journal of Human-Computer Studies Volume 126 (2019), p. 44
Pub. online: 17 Apr 2020      Type: Research Article      Open accessOpen Access
Journal:  Informatica Volume 31, Issue 3 (2020), pp. 459–479
   Abstract