フォロー
Nishant Doshi
Nishant Doshi
Pandit Deendayal Energy University, Gandhinagar
確認したメール アドレス: acm.org
タイトル
引用先
引用先
Human activity recognition: A survey
C Jobanputra, J Bavishi, N Doshi
Procedia Computer Science 155, 698-703, 2019
2812019
Security and privacy issues in cloud, fog and edge computing
S Parikh, D Dave, R Patel, N Doshi
Procedia Computer Science 160, 734-739, 2019
1102019
A novel MQTT security framework in generic IoT model
C Patel, N Doshi
Procedia Computer Science 171, 1399-1408, 2020
742020
Voice-controlled autonomous vehicle using IoT
S Sachdev, J Macwan, C Patel, N Doshi
Procedia Computer Science 160, 712-717, 2019
642019
Blockchain-based IoT: A survey
R Thakore, R Vaghashiya, C Patel, N Doshi
Procedia computer science 155, 704-709, 2019
602019
A survey on blockchain technology and its proposed solutions
D Dave, S Parikh, R Patel, N Doshi
Procedia Computer Science 160, 740-745, 2019
512019
Security challenges in IoT cyber world
C Patel, N Doshi
Security in smart cities: models, applications, and challenges, 171-191, 2019
482019
Fully secure ciphertext policy attribute‐based encryption with constant length ciphertext and faster decryption
N Doshi, DC Jinwala
Security and Communication Networks 7 (11), 1988-2002, 2014
462014
A survey of smart city infrastructure via case study on New York
J Shah, J Kothari, N Doshi
Procedia Computer Science 160, 702-705, 2019
432019
Social implications of smart cities
Y Patel, N Doshi
Procedia Computer Science 155, 692-697, 2019
432019
Analysis of robust weed detection techniques based on the Internet of Things (IoT)
F Dankhara, K Patel, N Doshi
Procedia Computer Science 160, 696-701, 2019
392019
A CNN-BiLSTM based Approach for Detection of SQL Injection Attacks
N Gandhi, J Patel, R Sisodiya, N Doshi, S Mishra
2021 International Conference on Computational Intelligence and Knowledge …, 2021
372021
Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext
N Doshi, D Jinwala
International Conference on Advanced Computing, Networking and Security, 515-523, 2011
362011
A Comparative study of applications of Game Theory in Cyber Security and Cloud Computing.
V Kakkad, H Shah, R Patel, N Doshi
Procedia Computer Science 155, 680-685, 2019
342019
An analytical study of biometric based remote user authentication schemes using smart cards
T Limbasiya, N Doshi
Computers & Electrical Engineering 59, 305-321, 2017
342017
Python: the most advanced programming language for computer science applications
AJ Dhruv, R Patel, N Doshi
Science and Technology Publications, Lda, 292-299, 2021
302021
Constant ciphertext length in multi-authority ciphertext policy attribute based encryption
N Doshi, D Jinwala
2011 2nd International Conference on Computer and Communication Technology …, 2011
262011
Secure lightweight key exchange using ECC for user-gateway paradigm
C Patel, N Doshi
IEEE Transactions on Computers 70 (11), 1789-1803, 2020
252020
Survey-pollution monitoring using IoT
J Arora, U Pandya, S Shah, N Doshi
Procedia Computer Science 155, 710-715, 2019
242019
FMD and mastitis disease detection in cows using Internet of Things (IOT)
S Vyas, V Shukla, N Doshi
Procedia Computer Science 160, 728-733, 2019
242019
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20