Internet of autonomous vehicles communications security: overview, issues, and directions A Nanda, D Puthal, JJPC Rodrigues, SA Kozlov IEEE Wireless Communications 26 (4), 60-65, 2019 | 113 | 2019 |
Secure authentication and load balancing of distributed edge datacenters D Puthal, R Ranjan, A Nanda, P Nanda, PP Jayaraman, AY Zomaya Journal of Parallel and Distributed Computing 124, 60-69, 2019 | 76 | 2019 |
Implicitly learning a user interest profile for personalization of web search using collaborative filtering A Nanda, R Omanwar, B Deshpande 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI …, 2014 | 35 | 2014 |
A computing perspective of quantum cryptography [energy and security] A Nanda, D Puthal, SP Mohanty, U Choppali IEEE Consumer Electronics Magazine 7 (6), 57-59, 2018 | 24 | 2018 |
A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks A Nanda, P Nanda, X He, A Jamdagni, D Puthal Future Generation Computer Systems 109, 521-530, 2020 | 20 | 2020 |
Extreme learning machines in the field of text classification RK Roul, A Nanda, V Patel, SK Sahay 2015 IEEE/ACIS 16th International Conference on Software Engineering …, 2015 | 18 | 2015 |
Decision tree based user-centric security solution for critical IoT infrastructure D Puthal, S Wilson, A Nanda, M Liu, S Swain, BPS Sahoo, K Yelamarthi, ... Computers and Electrical Engineering 99, 107754, 2022 | 17 | 2022 |
A novel hybrid authentication model for geo location oriented routing in dynamic wireless mesh networks A Nanda, P Nanda, X He, A Jamdagni, D Puthal Proceedings of the 51st Annual Hawaii International Conference on System …, 2018 | 8 | 2018 |
Weak-key analysis for bike post-quantum key encapsulation mechanism MR Nosouhi, SW Shah, L Pan, Y Zolotavkin, A Nanda, P Gauravaram, ... IEEE Transactions on Information Forensics and Security 18, 2160-2174, 2023 | 7 | 2023 |
Secure-GLOR: An adaptive secure routing protocol for dynamic wireless mesh networks A Nanda, P Nanda, X He, A Jamdagni, D Puthal 2017 IEEE Trustcom/BigDataSE/ICESS, 269-276, 2017 | 7 | 2017 |
A secure lightweight mutual authentication and key agreement protocol for healthcare systems AK Sahu, S Sharma, A Nanda Intelligent Data Security Solutions for e-Health Applications, 293-308, 2020 | 5 | 2020 |
A secure routing scheme for wireless mesh networks A Nanda, P Nanda, X He, A Jamdagni Information Systems Security: 12th International Conference, ICISS 2016 …, 2016 | 5 | 2016 |
Geo-location oriented routing protocol for smart dynamic mesh network A Nanda, P Nanda, X He 2016 IEEE 18th International Conference on High Performance Computing and …, 2016 | 4 | 2016 |
Towards Higher Levels of Assurance in Remote Identity Proofing A Nanda, SWA Shah, JJ Jeong, R Doss, J Webb IEEE Consumer Electronics Magazine, 2023 | 1 | 2023 |
Personalized web page recommendation using a graph-based approach to implicitly find influential users A Nanda, R Omanwar, B Deshpande Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014 …, 2014 | 1 | 2014 |
Examining usable security features and user perceptions of Physical Authentication Devices A Nanda, JJ Jeong, SWA Shah, M Nosouhi, R Doss Computers & Security 139, 103664, 2024 | | 2024 |
Crypto scams will increase over the holidays – here’s what you need to know to not fall victim A Nanda, J Webb, JJ Jeong, MR Nosouhi, SWA Shah https://theconversation.com/crypto-scams-will-increase-over-the-holidays …, 2022 | | 2022 |
What is multi-factor authentication, and how should I be using it? JJ Jeong, A Nanda, SWA Shah https://theconversation.com/what-is-multi-factor-authentication-and-how …, 2022 | | 2022 |
RIDP_IEEE_CEM. pdf A Nanda, SWA Shah, J Jeong, R Ram Mohan Doss figshare, 2022 | | 2022 |
Usable Security - the secret key to adoption of your cyber security technology R Doss, JJ Jeong, SWA Shah, A Nanda, J Webb https://cyberaustralia.partica.online/cyberaustralia/2022-2023/flipbook/132/, 2022 | | 2022 |