A construction of a conformal Chebyshev chaotic map based authentication protocol for healthcare telemedicine services D Dharminder, U Kumar, P Gupta Complex & Intelligent Systems 7 (5), 2531-2542, 2021 | 28 | 2021 |
Security analysis and application of Chebyshev Chaotic map in the authentication protocols D Dharminder, P Gupta International Journal of Computers and Applications 43 (10), 1095-1103, 2021 | 19 | 2021 |
Cryptographic Schemes Based on Elliptic Curves over the Ring [] M Kumar, P Gupta Applied Mathematics 7, 304-312, 2016 | 14 | 2016 |
A Novel and Secure Multiparty Key Exchange Scheme Using Trilinear Pairing Map Based on Elliptic Curve Cryptography M Kumar, P Gupta Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume …, 2018 | 12 | 2018 |
Edge based authentication protocol for vehicular communications without trusted party communication D Dharminder, U Kumar, P Gupta Journal of Systems Architecture 119, 102242, 2021 | 11 | 2021 |
Anti Drowning system using remote control TKY Chaudhari, G Pandit, P Gupta, M Kumar IOSR J. Eng 1, 38-42, 2016 | 11 | 2016 |
An Efficient and Authentication Signcryption Scheme Based on Elliptic Curves PG M Kumar MATEMATIKA 35 (1), 1-11, 2019 | 8 | 2019 |
A verifiable ring signature scheme of anonymous signcryption using ECC P Gupta, M Kumar International Journal of Mathematical Sciences and Computing 7 (2), 24-30, 2021 | 6 | 2021 |
Hematological disorders T Seth, P Gupta, VK Paul Textbook of pediatric. New Delhi: CBS Publication & Distributors Pvt Limited …, 2009 | 6 | 2009 |
A post quantum secure construction of an authentication protocol for satellite communication D Dharminder, PK Dadsena, P Gupta, S Sankaran International Journal of Satellite Communications and Networking 41 (1), 14-28, 2023 | 5 | 2023 |
Convergence of deficient quintic spline interpolation SS Rana, YP Dubey, P Gupta The Journal of the Indian Mathematical Society, 41-48, 2003 | 3 | 2003 |
A Novel and Secure Multiparty Key Exchange Scheme Using Trilinear Pairing Map Based on Elliptic Curve Cryptography M Kumar, P Gupta Soft Computing: Theories and Applications 1, 37, 2016 | 2 | 2016 |
A provably secure, shortest, and efficient identity based signcryption technique in the standard model A Aithekar, P Gupta, D Dharminder Security and Privacy 6 (1), e272, 2023 | 1 | 2023 |
Performance analysis of a fog computing-based vehicular communication M Kumar, P Gupta, A Kumar International Journal of Vehicle Information and Communication Systems 9 (2 …, 2024 | | 2024 |
A Dynamic Approach for Handling UAV in Crowded Environment Using Deep Q-Networks Y Upadhyay, M Gahlawat, S Nivetha, S Rana, B Natarajan, P Gupta 2023 4th IEEE Global Conference for Advancement in Technology (GCAT), 1-7, 2023 | | 2023 |
A module lattice based construction of post quantum blockchain for secure transactions in Internet of Things D Chaudhary, MSP Durgarao, P Gupta, S Rana, S Singh Artificial Intelligence, Blockchain, Computing and Security Volume 1, 351-357, 2023 | | 2023 |
A Provably Secure ID-Based Signcryption Protocol for Secure and Authentic Energy Efficient Communication S Kumar, P Gupta, D Dharminder | | 2021 |
The Techniques of Vedic Mathematics for ECC Over Weierstrass Elliptic Curve Y2 = X3 + Ax + B A Kumar, P Gupta, M Kumar Advances in Communication and Computational Technology: Select Proceedings …, 2021 | | 2021 |
Elliptic Curve Signcryption Scheme with Low Computational Cost for Conventional Key Exchange Solution M Kumar, P Gupta | | 2018 |
A secure and efficient heterogeneous ID‐based signcryption for unmanned aerial vehicular networking system A Aithekar, P Gupta, D Chaudhary Security and Privacy, e389, 0 | | |