|
Personal Details
|
|
Name | Dr Nishant Doshi |
Designation | Associate Professor |
Department | Department of Computer Science and Engineering, School of Technology |
Email | Nishant.Doshi@sot.pdpu.ac.in |
|
Educational Qualifications
|
| M.Tech. (Algorithm, Dhirubhai Ambani Institute of Information and Communication Technology), 2009 |
| Ph.D (Cryptography, Sardar Vallabhbhai National Institute of Technology), 2014 |
|
Professional Affiliation
|
IEEE Professional Member, ACM Professional Member, CRSI Life Member,CSI Life Member |
|
Awards
|
-Young Scientist Award 2015
-Young Faculty in Engineering Award 2017 |
|
|
Publications / Articles / Conference
|
Research based or onographs/Textbooks published |
| 'A study of Database Management Systems Part I', RRRNA, Feb 2024 |
| 'Investigating Approaches for Authentication Protocols in Cloud Computing', RRRNA, Nov 2022 |
| 'An Enhanced Approach for Authentication Scheme in Smart Healthcare System', RRRNA, Oct 2022 |
| 'Transformational study with Database Management Systems Part IV', RRRNA, Aug 2022 |
| 'Transformational study with Database Management Systems Part III', RRRNA, Jul 2022 |
| 'My Experiments with Database Management System : Part I', LAP, Aug 2021 |
| 'My Experiments with Database Management System : Part II', LAP, Mar 2021 |
| 'FUNDAMENTALS OF DATABASE SYSTEMS Hindi', NPTEL, Feb 2021 |
| 'Internet of Things Security Challenges, Advances, and Analytics', , Aug 2018 |
| 'A Survey on Multi-Server Remote User Authentication Scheme', , Nov 2016 |
| 'Novel Approach for Biometric Based Remote User Authentication System', , Mar 2016 |
| 'Securing personal health records in the cloud by using attribute based encryption. A review', , Dec 2015 |
| 'A Survey on the Two Factor Authentication Protocol used in the Telecare Medical Information System, including possible attack scenarios', , Dec 2015 |
| 'A survey on Remote User Authentication Scheme Using Smart Card', , Dec 2015 |
|
Articles/Chapters Published in the books |
| 'An Improved Approach in Cloud-Assisted IoT Infrastructure with Anonymous Key Issuing', Springer, Jul 2023 |
| 'A Transformational Study with Teaching', , Jun 2019 |
| 'An Enhanced Approach for Three Factor Remote User Authentication in Multi-Server Environment', , Oct 2018 |
| 'Secure Threshold Attribute-Based Signcryption with Constant Number of Pairings', , Dec 2018 |
| 'Security Challenges in IoT Cyber World', , Nov 2018 |
|
Published Papers in Journals |
| 'LDA-2IoT: A level dependent authentication using two factor for IoT paradigm', Computer Networks, pp. 1-1, Mar 2023, DOI : https://doi.org/10.1016/j.comnet.2023.109580 |
| 'A novel traceability approach in IoT paradigm for CP-ABE proxy re-encryption', Sadhana - Academy Proceedings in Engineering Sciences, pp. 1-1, Dec 2022, DOI : https://doi.org/10.1007/s12046-022-02007-w |
| 'AN ENHANCED APPROACH FOR CP-ABE WITH PROXY RE-ENCRYPTION IN IOT PARADIGM', Jordanian Journal of Computers and Information Technology, pp. 232-241, Sep 2022, DOI : https://doi.org/10.5455/jjcit.71-1643700224 |
| 'Cryptanalysis of authentication protocol for WSN in IoT based electric vehicle environment', Materials Today: Proceedings, Jan 2022 |
| 'An improved approach in CP-ABE with proxy re-encryption', e-Prime - Advances in Electrical Engineering, Electronics and Energy, pp. 1-1, Jun 2022, DOI : https://doi.org/10.1016/j.prime.2022.100042 |
| 'Technology Based Teaching (TBT): A Transformational Study with Database Management System', Journal of Engineering Education Transformations, Jan 2021 |
| 'Emerging Technologies and Applications for Smart Cities', International Journal of Ubiquitous Systems and Pervasive Networks, Jul 2021 |
| 'Discussion on “Robust Resiliency-Oriented Operation of Active Distribution Networks Considering Windstorms”', IEEE Transactions on Power Systems, Aug 2021 |
| 'LDA-IoT: a level dependent authentication for IoT paradigm', Information Security Journal: A Global Perspective, Jun 2021 |
| 'A Novel MQTT Security framework In Generic IoT Model', Procedia Computer Science, Jun 2020 |
| 'Discussion on “Actuator Placement for Enhanced Grid Dynamic Performance: A Machine Learning Approach”', IEEE Transactions on Power Systems, Aug 2020 |
| 'An Enhanced Approach for Three Factor Remote User Authentication in Multi-Server Environment', Journal of Intelligent and Fuzzy Systems, Dec 2020 |
| 'Secure Lightweight Key Exchange Using ECC for User-Gateway Paradigm', IEEE Transactions on Computers, Sep 2020 |
| 'A Survey of Smart City infrastructure via Case study on New York', Procedia Computer Science, Nov 2019 |
| 'Cryptanalysis and Improvement of Barman et al.’s Secure Remote User Authentication Scheme', international journal of circuits, systems and signal processing, Sep 2019 |
| 'Survey- Pollution Monitoring using IoT', Procedia Computer Science, Sep 2019 |
| 'Blockchain - based IoT: A Survey', Procedia Computer Science, Sep 2019 |
| 'Human Activity Recognition: A Survey', Procedia Computer Science, Sep 2019 |
| 'Social implications of smart cities', Procedia Computer Science, Sep 2019 |
| 'A survey on game theoretic approaches for privacy preservation in data mining and network security', Procedia Computer Science, Sep 2019 |
| 'Analysis of robust weed detection techniques based on the Internet of Things (IoT)', Procedia Computer Science, Elsevier, Nov 2019 |
| 'Voice-Controlled Autonomous Vehicle Using IoT', Procedia Computer Science, Nov 2019 |
| 'Smart cities-A case study of Porto and Ahmedabad', Procedia Computer Science, Nov 2019 |
| 'Open Communication Protocols for Building Automation Systems', Procedia Computer Science, Nov 2019 |
| 'FMD and Mastitis Disease Detection in Cows Using Internet of Things (IOT)', Procedia Computer Science, Nov 2019 |
| 'Security and Privacy Issues in Cloud, Fog and Edge Computing', Procedia Computer Science, Nov 2019 |
| 'A Survey on Blockchain Technology and its Proposed Solutions', Procedia Computer Science, Nov 2019 |
| 'Analysis of Fuzzy Based Provably Secure Multi-Server Authentication Remote User Authentication Scheme', WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONS, Dec 2019 |
| 'Analysis of Efficient and Privacy-Preserving Metering Protocols for 4. Smart Grid Systems', International Journal of Advanced Trends in Computer Science and Engineering, Dec 2019 |
| 'IoT – Principles and Paradigms', International Journal of Advanced Trends in Computer Science and Engineering, Dec 2019 |
| 'A Review of Smart Parking Using Internet of Things (IoT)', Procedia Computer Science, Nov 2019 |
| 'A Comparative study of applications of Game Theory in Cyber Security and Cloud Computing', Procedia Computer Science, Sep 2019 |
| 'An Improve Three Factor Remote User Authentication Scheme Using Smart Card', Wireless Personal Communications, Mar 2018 |
| 'An analytical study of biometric based remote user authentication schemes using smart cards', Computers & Electrical Engineering, Feb 2017 |
| 'A Password based Authentication scheme for Wireless Mobile Communications', Multimedia Tools and Applications, Apr 2017 |
| 'A Novel Approach for Privacy Homomorphism using Attribute Based Encryption', Security and Communication Network, Oct 2016 |
| 'Multi Authority Ciphertext Policy Attribute Based Encryption Schemes with Constant Ciphertext Length: A Survey', Networking and Communication Engineering, Dec 2014 |
| 'Fully Secure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext and Faster Decryption', Security and Communication Networks, Nov 2014 |
| 'Updating Attribute in CP-ABE: A New Approach', International Journal of Computer Applications, Jan 2013 |
| 'A novel approach for cryptography technique on Perturbed data for Distributed Environment', International Journal on Cryptography and Information Security, Sep 2012 |
| 'Hamiltonian cycle and TSP: A backtracking approach', International Journal on Computer Science and Engineering, Apr 2011 |
| 'Efficient Sorting for Repeated Data', JOURNAL OF COMPUTING, Aug 2011 |
| 'A Novel Approach for E-Payment Using Virtual Password System ', International Journal on Cryptography and Information Security, Dec 2011 |
| 'Width of a Binary Tree', International Journal of Computer Applications, Nov 2010 |
|
Full Papers in Conference Proceedings |
| 'On the Security of Privacy-Preserving Bilateral Attribute-Based Encryption', International Conference On Innovative Computing And Communication, pp. 229-236, Feb 2024, DOI : https://doi.org/10.1007/978-981-97-3591-4_19 |
| 'A Review on Quantum Blockchain Based Consensus Mechanism Approaches', ICT4SD 2023, pp. 59-64, Aug 2023, DOI : 10.1007/978-981-99-5652-4_7 |
| 'Automatic Text summarization in Gujarati language', 2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC), pp. 1-6, Feb 2023, DOI : https://doi.org/10.1109/iSSSC56467.2022.10051338 |
| 'Cryptanalysis of Authentication Protocol for Cloud Assisted IoT Environment', , pp. 886-891, May 2023, DOI : https://doi.org/10.1016/j.procs.2023.03.120 |
| 'A Review on Multimodal Face Anti-Spoofing in Multi-layer Environment', ICT4SD 2023, pp. 49-57, Aug 2023, DOI : 10.1007/978-981-99-5652-4_6 |
| 'A Review on Fingerprint Features and Algorithms', ICT4SD 2023, pp. 325-334, Aug 2023, DOI : 10.1007/978-981-99-5652-4_29 |
| 'A Review on Talk-able Facial Construction', I2CT 2023, pp. 1-1, Apr 2023, DOI : 10.1109/I2CT57861.2023.10126149 |
| 'A Review on Poligraph: System for False News Detection', ICT4SD 2023, pp. 65-71, Aug 2023, DOI : 10.1007/978-981-99-5652-4_8 |
| 'A Review on Verifiable Image Licensing Approaches', ICT4SD 2023, pp. 41-48, Aug 2023, DOI : 10.1007/978-981-99-5652-4_5 |
| 'An Analysis of Task-Based Algorithms for Cloud Computing', ICTIS 2023, pp. 481-491, Apr 2023, DOI : 10.1007/978-981-99-3758-5_44 |
| 'An Analysis of Resource-Oriented Algorithms for Cloud Computing', ICTIS 2023, pp. 505-516, Apr 2023, DOI : 10.1007/978-981-99-3758-5_46 |
| 'Text summarization using Secretary problem', 2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC), pp. 1-6, Feb 2023, DOI : https://doi.org/10.1109/iSSSC56467.2022.10051552 |
| 'Cyber-Awareness for Dummies', 4th International Conference on Futuristic Trends in Networks and Computing Technologies, FTNCT 2021, pp. 1073-1085, Nov 2022, DOI : https://doi.org/10.1007/978-981-19-5037-7_77 |
| 'Overview of Present-Day IoT Data Processing Technologies', 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, EUSPN / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare, ICTH 2022 / Affiliated Workshops, pp. 277-282, Nov 2022, DOI : https://doi.org/10.1016/j.procs.2022.10.150 |
| 'Integrated Database Management System for Emergency Services', International Conference on Artificial Intelligence and Machine Vision (AIMV), Jan 2022 |
| 'An Analytical Survey of Energy Efficiency in IoT Paradigm', 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, EUSPN / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare, ICTH 2022 / Affiliated Workshops, pp. 238-288, Nov 2022, DOI : https://doi.org/10.1016/j.procs.2022.10.151 |
| 'Internet of Behavior in Cybersecurity: Opportunities and Challenges', 4th International Conference on Futuristic Trends in Networks and Computing Technologies, FTNCT 2021, pp. 219-227, Nov 2022, DOI : https://doi.org/10.1007/978-981-19-5037-7_14 |
| 'Study of Security in Cryptocurrency', 6th International Conference on Information and Communication Technology for Intelligent Systems, ICTIS 2021, pp. 61-69, Oct 2022, DOI : https://doi.org/10.1007/978-981-19-3571-8_8 |
| 'Study and Analysis of Network Steganography Methods', 6th International Conference on Information and Communication Technology for Intelligent Systems, ICTIS 2021, pp. 71-79, Oct 2022, DOI : https://doi.org/10.1007/978-981-19-3571-8_9 |
| 'A Survey on IoT-Based Smart Cars, their Functionalities and Challenges', 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, EUSPN / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare, ICTH 2022 / Affiliated Workshops, pp. 295-300, Nov 2022, DOI : https://doi.org/10.1016/j.procs.2022.10.153 |
| 'Cryptanalysis of IoT-Based Authentication Protocol Scheme', Mathematical Modeling, Computational Intelligence Techniques and Renewable Energy., Feb 2021 |
| 'Cryptanalysis of Fuzzy-Based Mobile Lightweight Protocol Scheme', Mathematical Modeling, Computational Intelligence Techniques and Renewable Energy., Dec 2021 |
| 'Database Management Systems—An Efficient, Effective, and Augmented Approach for Organizations', ICT with Intelligent Applications, Dec 2021 |
| 'Smart Office Automation System using IOT: An efficient database management system', 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), Apr 2021 |
| 'A CNN-BiLSTM based Approach for Detection of SQL Injection Attacks', 2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), Mar 2021 |
| 'Python: The Most Advanced Programming Language for Computer Science Applica', International Conference on Culture Heritage, Education, Sustainable Tourism, and Innovation Technologies, Mar 2021 |
| 'Internet of Things: A Review on Major Challenges and Applications. ', Reliability and Risk Assessment in Engineering, May 2020 |
| 'IoT and Modern Marketing: Its Social Implications', 22nd International Conference on Advanced Communication Technology (ICACT), Apr 2020 |
| 'A Survey of Cryptographic Techniques to Secure Genomic Data', First International Conference on Computing, Communications, and Cyber-Security, Apr 2020 |
| 'A Novel Lightweight Authentication for Intelligent Energy Monitoring in Smart Home', Intelligent Systems, Technologies and Applications, May 2020 |
| 'Cryptanalysis of ecc-based key agreement scheme for generic IoT network model', 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Dec 2019 |
| 'Real Time Adaptive Traffic Control System : A Hybrid Approach', IEEE 4th International Conference on Computer and Communication Systems, Sep 2019 |
| 'Analysis of Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid of IoT', International Conference on Intelligent Computing & Optimization, Sep 2018 |
| 'An Enhanced Scheme for PHR on Cloud Servers Using CP-ABE', Information and Communication Technology for Competitive Strategies, Aug 2018 |
| 'Industrial Internet of Things: A comprehensive overview', INCRS, Jan 2018 |
| 'A Novel Approach for Biometric Based Remote User Authentication Scheme using Smart Card', ICACCI, Sep 2018 |
| 'Analysis of Fuzzy Based Provably Secure Multi-Server Authentication Remote User Authentication Scheme', 3rd International Conference on Applied Mathematics and Computer Science, Oct 2018 |
| 'Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption ', International Conference on Communication, Computing and Virtualization, Apr 2016 |
| 'A User Privacy Conserving Authentication System Using Smart Card for Telecare Medicine Information Systems', Second International Conference on Information and Communication Technology for Competitive Strategies, Mar 2016 |
| 'An Enhanced Version of Key Agreement System with User Privacy for Telecare Medicine Information Systems', First International Conference on Information and Communication Technology for Intelligent Systems, Jul 2016 |
| 'Analysis of Untraceable Dynamic Identity Based Remote User Authentication Scheme', International Conference on Communication Networks, Jul 2016 |
| 'An efficient approach for privacy preserving distributed mining of association rules in unsecured environment', Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on, Sep 2015 |
| 'A survey on attacks in remote user authentication scheme', Computational Intelligence and Computing Research (ICCIC), 2014 IEEE International Conference on, Sep 2015 |
| 'Cryptanalysis of Lo et al.’s Password Based Authentication Scheme', Fourth International Conference on Networks & Communications, Feb 2013 |
| 'AB-OR: Improving the Efficiency in Onion Routing Using Attribute Based Cryptography', Fourth International Conference on Networks & Communications, Feb 2013 |
| 'Efficient Cryptography Technique on Perturbed Data in Distributed Environment', Second International Conference on Advances in Computing and Information Technology, Jul 2012 |
| 'A Novel Approach for Email Login System', Second International Conference, CCSIT , Jan 2012 |
| 'Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext', International Conference, ADCONS, Dec 2011 |
| 'Constant ciphertext length in multi-authority Ciphertext Policy Attribute Based Encryption', Computer and Communication Technology (ICCCT), 2011 2nd International Conference on, Nov 2011 |
| 'Using Ciphertext Policy Attribute Based Encryption for Verifiable Secret Sharing', International Conference on Security & Management, Dec 2011 |
| 'Width of a General Tree for Packet Routing', Second International Conference on Advances in Communication, Network, and Computing,, Mar 2011 |
| 'A Novel Approach for Matrix Chain Multiplication Using Greedy Technique for Packet Processing', Second International Conference on Advances in Communication, Network, and Computing, Mar 2011 |
|
Papers presented in Conferences, Seminars, Workshops, Symposia |
| 'Real Time Adaptive Traffic Control System : A Hybrid Approach', IEEE 4th International Conference on Computer and Communication Systems, Sep 2019 |
|
|
|