Dr. Ashish Nanda
Cited by
Cited by
Internet of autonomous vehicles communications security: overview, issues, and directions
A Nanda, D Puthal, JJPC Rodrigues, SA Kozlov
IEEE Wireless Communications 26 (4), 60-65, 2019
Secure authentication and load balancing of distributed edge datacenters
D Puthal, R Ranjan, A Nanda, P Nanda, PP Jayaraman, AY Zomaya
Journal of Parallel and Distributed Computing 124, 60-69, 2019
Implicitly learning a user interest profile for personalization of web search using collaborative filtering
A Nanda, R Omanwar, B Deshpande
2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI …, 2014
A computing perspective of quantum cryptography [energy and security]
A Nanda, D Puthal, SP Mohanty, U Choppali
IEEE Consumer Electronics Magazine 7 (6), 57-59, 2018
A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks
A Nanda, P Nanda, X He, A Jamdagni, D Puthal
Future Generation Computer Systems 109, 521-530, 2020
Extreme learning machines in the field of text classification
RK Roul, A Nanda, V Patel, SK Sahay
2015 IEEE/ACIS 16th International Conference on Software Engineering …, 2015
Decision tree based user-centric security solution for critical IoT infrastructure
D Puthal, S Wilson, A Nanda, M Liu, S Swain, BPS Sahoo, K Yelamarthi, ...
Computers and Electrical Engineering 99, 107754, 2022
A novel hybrid authentication model for geo location oriented routing in dynamic wireless mesh networks
A Nanda, P Nanda, X He, A Jamdagni, D Puthal
Proceedings of the 51st Annual Hawaii International Conference on System …, 2018
Weak-key analysis for bike post-quantum key encapsulation mechanism
MR Nosouhi, SW Shah, L Pan, Y Zolotavkin, A Nanda, P Gauravaram, ...
IEEE Transactions on Information Forensics and Security 18, 2160-2174, 2023
Secure-GLOR: An adaptive secure routing protocol for dynamic wireless mesh networks
A Nanda, P Nanda, X He, A Jamdagni, D Puthal
2017 IEEE Trustcom/BigDataSE/ICESS, 269-276, 2017
A secure lightweight mutual authentication and key agreement protocol for healthcare systems
AK Sahu, S Sharma, A Nanda
Intelligent Data Security Solutions for e-Health Applications, 293-308, 2020
A secure routing scheme for wireless mesh networks
A Nanda, P Nanda, X He, A Jamdagni
Information Systems Security: 12th International Conference, ICISS 2016 …, 2016
Geo-location oriented routing protocol for smart dynamic mesh network
A Nanda, P Nanda, X He
2016 IEEE 18th International Conference on High Performance Computing and …, 2016
Towards Higher Levels of Assurance in Remote Identity Proofing
A Nanda, SWA Shah, JJ Jeong, R Doss, J Webb
IEEE Consumer Electronics Magazine, 2023
Personalized web page recommendation using a graph-based approach to implicitly find influential users
A Nanda, R Omanwar, B Deshpande
Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014 …, 2014
Examining usable security features and user perceptions of Physical Authentication Devices
A Nanda, JJ Jeong, SWA Shah, M Nosouhi, R Doss
Computers & Security 139, 103664, 2024
Crypto scams will increase over the holidays – here’s what you need to know to not fall victim
A Nanda, J Webb, JJ Jeong, MR Nosouhi, SWA Shah …, 2022
What is multi-factor authentication, and how should I be using it?
JJ Jeong, A Nanda, SWA Shah …, 2022
A Nanda, SWA Shah, J Jeong, R Ram Mohan Doss
figshare, 2022
Usable Security - the secret key to adoption of your cyber security technology
R Doss, JJ Jeong, SWA Shah, A Nanda, J Webb, 2022
The system can't perform the operation now. Try again later.
Articles 1–20