Go Back

Personal Details
NameDr Nishant Doshi
DesignationAssociate Professor
DepartmentDepartment of Computer Science and Engineering, School of Technology
EmailNishant.Doshi@sot.pdpu.ac.in
Educational Qualifications
  • M.Tech. (Algorithm, Dhirubhai Ambani Institute of Information and Communication Technology), 2009
  • Ph.D (Cryptography, Sardar Vallabhbhai National Institute of Technology), 2014
    Professional Affiliation
    IEEE Professional Member, ACM Professional Member, CRSI Life Member,CSI Life Member
    Awards
    -Young Scientist Award 2015 -Young Faculty in Engineering Award 2017
    Publications / Articles / Conference
    Research based or onographs/Textbooks published
  • 'A study of Database Management Systems Part I', RRRNA, Feb 2024
  • 'Investigating Approaches for Authentication Protocols in Cloud Computing', RRRNA, Nov 2022
  • 'An Enhanced Approach for Authentication Scheme in Smart Healthcare System', RRRNA, Oct 2022
  • 'Transformational study with Database Management Systems Part IV', RRRNA, Aug 2022
  • 'Transformational study with Database Management Systems Part III', RRRNA, Jul 2022
  • 'My Experiments with Database Management System : Part I', LAP, Aug 2021
  • 'My Experiments with Database Management System : Part II', LAP, Mar 2021
  • 'FUNDAMENTALS OF DATABASE SYSTEMS Hindi', NPTEL, Feb 2021
  • 'Internet of Things Security Challenges, Advances, and Analytics', , Aug 2018
  • 'A Survey on Multi-Server Remote User Authentication Scheme', , Nov 2016
  • 'Novel Approach for Biometric Based Remote User Authentication System', , Mar 2016
  • 'Securing personal health records in the cloud by using attribute based encryption. A review', , Dec 2015
  • 'A Survey on the Two Factor Authentication Protocol used in the Telecare Medical Information System, including possible attack scenarios', , Dec 2015
  • 'A survey on Remote User Authentication Scheme Using Smart Card', , Dec 2015
    Articles/Chapters Published in the books
  • 'An Improved Approach in Cloud-Assisted IoT Infrastructure with Anonymous Key Issuing', Springer, Jul 2023
  • 'A Transformational Study with Teaching', , Jun 2019
  • 'An Enhanced Approach for Three Factor Remote User Authentication in Multi-Server Environment', , Oct 2018
  • 'Secure Threshold Attribute-Based Signcryption with Constant Number of Pairings', , Dec 2018
  • 'Security Challenges in IoT Cyber World', , Nov 2018
    Published Papers in Journals
  • 'Security Enhanced CLS and CL-AS Scheme Without Pairings for VANETs', IEEE Access, pp. 42508-42520, Feb 2025, DOI : https://doi.org/10.1109/ACCESS.2025.3546699
  • 'LDA-2IoT: A level dependent authentication using two factor for IoT paradigm', Computer Networks, pp. 1-1, Mar 2023, DOI : https://doi.org/10.1016/j.comnet.2023.109580
  • 'An improved approach in CP-ABE with proxy re-encryption', e-Prime - Advances in Electrical Engineering, Electronics and Energy, pp. 1-1, Jun 2022, DOI : https://doi.org/10.1016/j.prime.2022.100042
  • 'A novel traceability approach in IoT paradigm for CP-ABE proxy re-encryption', Sadhana - Academy Proceedings in Engineering Sciences, pp. 1-1, Dec 2022, DOI : https://doi.org/10.1007/s12046-022-02007-w
  • 'AN ENHANCED APPROACH FOR CP-ABE WITH PROXY RE-ENCRYPTION IN IOT PARADIGM', Jordanian Journal of Computers and Information Technology, pp. 232-241, Sep 2022, DOI : https://doi.org/10.5455/jjcit.71-1643700224
  • 'Cryptanalysis of authentication protocol for WSN in IoT based electric vehicle environment', Materials Today: Proceedings, Jan 2022
  • 'Technology Based Teaching (TBT): A Transformational Study with Database Management System', Journal of Engineering Education Transformations, Jan 2021
  • 'Emerging Technologies and Applications for Smart Cities', International Journal of Ubiquitous Systems and Pervasive Networks, Jul 2021
  • 'Discussion on “Robust Resiliency-Oriented Operation of Active Distribution Networks Considering Windstorms”', IEEE Transactions on Power Systems, Aug 2021
  • 'LDA-IoT: a level dependent authentication for IoT paradigm', Information Security Journal: A Global Perspective, Jun 2021
  • 'A Novel MQTT Security framework In Generic IoT Model', Procedia Computer Science, Jun 2020
  • 'Discussion on “Actuator Placement for Enhanced Grid Dynamic Performance: A Machine Learning Approach”', IEEE Transactions on Power Systems, Aug 2020
  • 'An Enhanced Approach for Three Factor Remote User Authentication in Multi-Server Environment', Journal of Intelligent and Fuzzy Systems, Dec 2020
  • 'Secure Lightweight Key Exchange Using ECC for User-Gateway Paradigm', IEEE Transactions on Computers, Sep 2020
  • 'A Review of Smart Parking Using Internet of Things (IoT)', Procedia Computer Science, Nov 2019
  • 'Cryptanalysis and Improvement of Barman et al.’s Secure Remote User Authentication Scheme', international journal of circuits, systems and signal processing, Sep 2019
  • 'Survey- Pollution Monitoring using IoT', Procedia Computer Science, Sep 2019
  • 'Blockchain - based IoT: A Survey', Procedia Computer Science, Sep 2019
  • 'Human Activity Recognition: A Survey', Procedia Computer Science, Sep 2019
  • 'Social implications of smart cities', Procedia Computer Science, Sep 2019
  • 'A survey on game theoretic approaches for privacy preservation in data mining and network security', Procedia Computer Science, Sep 2019
  • 'A Comparative study of applications of Game Theory in Cyber Security and Cloud Computing', Procedia Computer Science, Sep 2019
  • 'Voice-Controlled Autonomous Vehicle Using IoT', Procedia Computer Science, Nov 2019
  • 'Smart cities-A case study of Porto and Ahmedabad', Procedia Computer Science, Nov 2019
  • 'Open Communication Protocols for Building Automation Systems', Procedia Computer Science, Nov 2019
  • 'FMD and Mastitis Disease Detection in Cows Using Internet of Things (IOT)', Procedia Computer Science, Nov 2019
  • 'Security and Privacy Issues in Cloud, Fog and Edge Computing', Procedia Computer Science, Nov 2019
  • 'A Survey on Blockchain Technology and its Proposed Solutions', Procedia Computer Science, Nov 2019
  • 'Analysis of Fuzzy Based Provably Secure Multi-Server Authentication Remote User Authentication Scheme', WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONS, Dec 2019
  • 'Analysis of Efficient and Privacy-Preserving Metering Protocols for 4. Smart Grid Systems', International Journal of Advanced Trends in Computer Science and Engineering, Dec 2019
  • 'IoT – Principles and Paradigms', International Journal of Advanced Trends in Computer Science and Engineering, Dec 2019
  • 'A Survey of Smart City infrastructure via Case study on New York', Procedia Computer Science, Nov 2019
  • 'Analysis of robust weed detection techniques based on the Internet of Things (IoT)', Procedia Computer Science, Elsevier, Nov 2019
  • 'An Improve Three Factor Remote User Authentication Scheme Using Smart Card', Wireless Personal Communications, Mar 2018
  • 'An analytical study of biometric based remote user authentication schemes using smart cards', Computers & Electrical Engineering, Feb 2017
  • 'A Password based Authentication scheme for Wireless Mobile Communications', Multimedia Tools and Applications, Apr 2017
  • 'A Novel Approach for Privacy Homomorphism using Attribute Based Encryption', Security and Communication Network, Oct 2016
  • 'Multi Authority Ciphertext Policy Attribute Based Encryption Schemes with Constant Ciphertext Length: A Survey', Networking and Communication Engineering, Dec 2014
  • 'Fully Secure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext and Faster Decryption', Security and Communication Networks, Nov 2014
  • 'Updating Attribute in CP-ABE: A New Approach', International Journal of Computer Applications, Jan 2013
  • 'A novel approach for cryptography technique on Perturbed data for Distributed Environment', International Journal on Cryptography and Information Security, Sep 2012
  • 'Hamiltonian cycle and TSP: A backtracking approach', International Journal on Computer Science and Engineering, Apr 2011
  • 'Efficient Sorting for Repeated Data', JOURNAL OF COMPUTING, Aug 2011
  • 'A Novel Approach for E-Payment Using Virtual Password System ', International Journal on Cryptography and Information Security, Dec 2011
  • 'Width of a Binary Tree', International Journal of Computer Applications, Nov 2010
    Full Papers in Conference Proceedings
  • 'A Review: Implementation of Partially Homomorphic Encryption and Fully Homomorphic Encryption on Cloud Computing', ICT4SD , pp. 147-155, Aug 2024, DOI : https://doi.org/10.1007/978-981-97-8602-2_14
  • 'On the Security of Privacy-Preserving Bilateral Attribute-Based Encryption', International Conference On Innovative Computing And Communication, pp. 229-236, Feb 2024, DOI : https://doi.org/10.1007/978-981-97-3591-4_19
  • 'Comparative Analysis of Part of Speech(POS) Tagger for Gujarati Language using Deep Learning and Pre-Trained LLM', 2024 3rd International Conference for Innovation in Technology, pp. 1-3, Mar 2024, DOI : https://doi.org/10.1109/INOCON60754.2024.10511678
  • 'Text summarization using Secretary problem', 2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC), pp. 1-6, Feb 2023, DOI : https://doi.org/10.1109/iSSSC56467.2022.10051552
  • 'Automatic Text summarization in Gujarati language', 2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC), pp. 1-6, Feb 2023, DOI : https://doi.org/10.1109/iSSSC56467.2022.10051338
  • 'Cryptanalysis of Authentication Protocol for Cloud Assisted IoT Environment', , pp. 886-891, May 2023, DOI : https://doi.org/10.1016/j.procs.2023.03.120
  • 'A Review on Multimodal Face Anti-Spoofing in Multi-layer Environment', ICT4SD 2023, pp. 49-57, Aug 2023, DOI : https://doi.org/10.1007/978-981-99-5652-4_6
  • 'A Review on Quantum Blockchain Based Consensus Mechanism Approaches', ICT4SD 2023, pp. 59-64, Aug 2023, DOI : https://doi.org/10.1007/978-981-99-5652-4_7
  • 'A Review on Talk-able Facial Construction', I2CT 2023, pp. 1-1, Apr 2023, DOI : https://doi.org/10.1109/I2CT57861.2023.10126149
  • 'A Review on Poligraph: System for False News Detection', ICT4SD 2023, pp. 65-71, Aug 2023, DOI : https://doi.org/10.1007/978-981-99-5652-4_8
  • 'An Analysis of Resource-Oriented Algorithms for Cloud Computing', ICTIS 2023, pp. 505-516, Apr 2023, DOI : https://doi.org/10.1007/978-981-99-3758-5_46
  • 'A Review on Verifiable Image Licensing Approaches', ICT4SD 2023, pp. 41-48, Aug 2023, DOI : https://doi.org/10.1007/978-981-99-5652-4_5
  • 'An Analysis of Task-Based Algorithms for Cloud Computing', ICTIS 2023, pp. 481-491, Apr 2023, DOI : https://doi.org/10.1007/978-981-99-3758-5_44
  • 'A Review on Fingerprint Features and Algorithms', ICT4SD 2023, pp. 325-334, Aug 2023, DOI : https://doi.org/10.1007/978-981-99-5652-4_29
  • 'Cyber-Awareness for Dummies', 4th International Conference on Futuristic Trends in Networks and Computing Technologies, FTNCT 2021, pp. 1073-1085, Nov 2022, DOI : https://doi.org/10.1007/978-981-19-5037-7_77
  • 'Integrated Database Management System for Emergency Services', International Conference on Artificial Intelligence and Machine Vision (AIMV), Jan 2022
  • 'An Analytical Survey of Energy Efficiency in IoT Paradigm', 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, EUSPN / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare, ICTH 2022 / Affiliated Workshops, pp. 238-288, Nov 2022, DOI : https://doi.org/10.1016/j.procs.2022.10.151
  • 'Overview of Present-Day IoT Data Processing Technologies', 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, EUSPN / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare, ICTH 2022 / Affiliated Workshops, pp. 277-282, Nov 2022, DOI : https://doi.org/10.1016/j.procs.2022.10.150
  • 'Study and Analysis of Network Steganography Methods', 6th International Conference on Information and Communication Technology for Intelligent Systems, ICTIS 2021, pp. 71-79, Oct 2022, DOI : https://doi.org/10.1007/978-981-19-3571-8_9
  • 'Internet of Behavior in Cybersecurity: Opportunities and Challenges', 4th International Conference on Futuristic Trends in Networks and Computing Technologies, FTNCT 2021, pp. 219-227, Nov 2022, DOI : https://doi.org/10.1007/978-981-19-5037-7_14
  • 'Study of Security in Cryptocurrency', 6th International Conference on Information and Communication Technology for Intelligent Systems, ICTIS 2021, pp. 61-69, Oct 2022, DOI : https://doi.org/10.1007/978-981-19-3571-8_8
  • 'A Survey on IoT-Based Smart Cars, their Functionalities and Challenges', 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, EUSPN / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare, ICTH 2022 / Affiliated Workshops, pp. 295-300, Nov 2022, DOI : https://doi.org/10.1016/j.procs.2022.10.153
  • 'A CNN-BiLSTM based Approach for Detection of SQL Injection Attacks', 2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), Mar 2021
  • 'Cryptanalysis of IoT-Based Authentication Protocol Scheme', Mathematical Modeling, Computational Intelligence Techniques and Renewable Energy., Feb 2021
  • 'Python: The Most Advanced Programming Language for Computer Science Applica', International Conference on Culture Heritage, Education, Sustainable Tourism, and Innovation Technologies, Mar 2021
  • 'Database Management Systems—An Efficient, Effective, and Augmented Approach for Organizations', ICT with Intelligent Applications, Dec 2021
  • 'Cryptanalysis of Fuzzy-Based Mobile Lightweight Protocol Scheme', Mathematical Modeling, Computational Intelligence Techniques and Renewable Energy., Dec 2021
  • 'Smart Office Automation System using IOT: An efficient database management system', 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), Apr 2021
  • 'A Novel Lightweight Authentication for Intelligent Energy Monitoring in Smart Home', Intelligent Systems, Technologies and Applications, May 2020
  • 'Internet of Things: A Review on Major Challenges and Applications. ', Reliability and Risk Assessment in Engineering, May 2020
  • 'IoT and Modern Marketing: Its Social Implications', 22nd International Conference on Advanced Communication Technology (ICACT), Apr 2020
  • 'A Survey of Cryptographic Techniques to Secure Genomic Data', First International Conference on Computing, Communications, and Cyber-Security, Apr 2020
  • 'Cryptanalysis of ecc-based key agreement scheme for generic IoT network model', 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Dec 2019
  • 'Real Time Adaptive Traffic Control System : A Hybrid Approach', IEEE 4th International Conference on Computer and Communication Systems, Sep 2019
  • 'An Enhanced Scheme for PHR on Cloud Servers Using CP-ABE', Information and Communication Technology for Competitive Strategies, Aug 2018
  • 'A Novel Approach for Biometric Based Remote User Authentication Scheme using Smart Card', ICACCI, Sep 2018
  • 'Industrial Internet of Things: A comprehensive overview', INCRS, Jan 2018
  • 'Analysis of Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid of IoT', International Conference on Intelligent Computing & Optimization, Sep 2018
  • 'Analysis of Fuzzy Based Provably Secure Multi-Server Authentication Remote User Authentication Scheme', 3rd International Conference on Applied Mathematics and Computer Science, Oct 2018
  • 'Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption ', International Conference on Communication, Computing and Virtualization, Apr 2016
  • 'An Enhanced Version of Key Agreement System with User Privacy for Telecare Medicine Information Systems', First International Conference on Information and Communication Technology for Intelligent Systems, Jul 2016
  • 'Analysis of Untraceable Dynamic Identity Based Remote User Authentication Scheme', International Conference on Communication Networks, Jul 2016
  • 'A User Privacy Conserving Authentication System Using Smart Card for Telecare Medicine Information Systems', Second International Conference on Information and Communication Technology for Competitive Strategies, Mar 2016
  • 'A survey on attacks in remote user authentication scheme', Computational Intelligence and Computing Research (ICCIC), 2014 IEEE International Conference on, Sep 2015
  • 'An efficient approach for privacy preserving distributed mining of association rules in unsecured environment', Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on, Sep 2015
  • 'Cryptanalysis of Lo et al.’s Password Based Authentication Scheme', Fourth International Conference on Networks & Communications, Feb 2013
  • 'AB-OR: Improving the Efficiency in Onion Routing Using Attribute Based Cryptography', Fourth International Conference on Networks & Communications, Feb 2013
  • 'Efficient Cryptography Technique on Perturbed Data in Distributed Environment', Second International Conference on Advances in Computing and Information Technology, Jul 2012
  • 'A Novel Approach for Email Login System', Second International Conference, CCSIT , Jan 2012
  • 'A Novel Approach for Matrix Chain Multiplication Using Greedy Technique for Packet Processing', Second International Conference on Advances in Communication, Network, and Computing, Mar 2011
  • 'Width of a General Tree for Packet Routing', Second International Conference on Advances in Communication, Network, and Computing,, Mar 2011
  • 'Using Ciphertext Policy Attribute Based Encryption for Verifiable Secret Sharing', International Conference on Security & Management, Dec 2011
  • 'Constant ciphertext length in multi-authority Ciphertext Policy Attribute Based Encryption', Computer and Communication Technology (ICCCT), 2011 2nd International Conference on, Nov 2011
  • 'Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext', International Conference, ADCONS, Dec 2011
    Papers presented in Conferences, Seminars, Workshops, Symposia

  • 'On the Security of Privacy-Preserving Bilateral Attribute-Based Encryption', International Conference On Innovative Computing And Communication, feb 2024
  • 'Real Time Adaptive Traffic Control System : A Hybrid Approach', IEEE 4th International Conference on Computer and Communication Systems, Sep 2019