Dharminder Chaudhary's research while affiliated with Amrita Vishwa Vidyapeetham and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (24)
An authenticated mobile key exchange is necessary for post quantum secure communication over a public channel. It enables two parties to establish a secure fresh session key for each of the communication. In the last few years, many post quantum authentication key exchange protocols have been designed. This article contains a discussion how the Dab...
The study of information security and privacy is currently quite popular. In parallel, several computing paradigms, such as cloud and edge computing, are already creating a unique ecosystem with various designs, storage possibilities, and processing capacities. The diversity of this ecosystem has several limitations, particularly in terms of securi...
Smart grid (SG) is an advanced framework for controlling computers, automation, new technologies, and smart equipment that is more efficient and dependable. Smart grid possesses advanced self-healing capabilities and enables electricity customers to become active participants. Both security and privacy are two very important attributes of SG commun...
Smart grids are important in modern smart cities for setting and managing the response demands, for this, they use Information and Communication Technologies. Many kinds of sensors are used in Smart Grid Environment for the surveillance purposes in an area. Their response time is less which is the reason these are deployed in high-tension areas suc...
The concept of a smart city is increasing because of the demand for intelligent drones. So, the Internet of Drones came into picture, providing several benefits/services for daily life. Services that IoD offers are monitoring, FANET (Flying Ad-Hoc Networks), management of any infrastructure, and IoT (Internet of Things). These services can be deplo...
Once the shared secret key is established, three parties can use it for secure communication using symmetric-key encryption AES (128, 192, 256) algorithms or other cryptographic primitives. Although there are few third-party post-quantum authentication and key agreement protocols exist, but the recent studies in this article show that they are not...
Post quantum cryptography is the key idea to resist quantum attacks. The Fiat-Shamir were the first who introduce efficient lattice-based signatures. A lattice-based signature ensures the security of blockchain architecture against quantum computers. However, a blockchain is always consisting of multiple communicating nodes, so there is a need to d...
The Fiat–Shamir with Aborts paradigm of Lyubashevsky introduced efficient lattice based signatures. A lattice‐based signature is used to design post quantum secure blockchain architecture. But, a blockchain is always consisting of multiple nodes, and then we need an efficient aggregate signature to verify nodes in one‐step. We have designed a block...
The issue of animal attacks is increasingly concerning for rural populations and forestry workers. To track the movement of wild animals, surveillance cameras and drones are often employed. However, an efficient model is required to detect the animal type, monitor its locomotion and provide its location information. Alert messages can then be sent...
The Internet of Vehicles (IoV), with advanced technology in 5G communication, is considered the backbone of a smart city’s intelligent transport system. There are mainly two types of vehicular communication: (1) Vehicle to Vehicle (V2V) and (2) Vehicle to Infrastructure (V2I). In IoV, there is a dynamic change in the network topology according to t...
A three-party authenticated key exchange protocol enables two entities to agree on a session key with the help of a dedicated server over public channel. Shor’s algorithm is a big threat for existing authenticated key exchange protocols. Lattice based cryptography plays a very important role in designing authentication and key agreement secure agai...
Citations
... al. [25] proposed new scheme for three party key agreement using lattice and elliptic curve cryptography both. His scheme is secure from user's anonymity but they use maximum number of message transformation for complete one session. ...
... Finally, we cover the current-day progress of quantum internet, particularly focusing from the perspective of network layer architecture. The unique attributes of quantum mechanics have been leveraged for quantum computing and communication in variety of fields and domains, such as, vehicular communications [312] [313], biomedical applications [314], social networks [315], electric grids [316], etc. The paper also summarizes the recent trends in this domain with a multitude of research endeavors aimed at addressing various open problems and challenges in the field. ...
... With the development of deep learning techniques, the performance of animal behavior recognition has been significantly improved. Natarajan et al. [6] achieve high-accuracy detection of wild-animal behavior using deep learning models. In order to ensure real-time performance, Fuentes et al. [7] proposed a behavior recognition algorithm for cattle based on a spatial-and-temporal information framework. ...
... , x m−1 , p 1 , . . . , p n ]) on the interval [0, 1] is given by [37,38]: ...
... This section offers an analysis of our protocol's performance and conducts a comparison with the related work of Tanveer et al. [1], Irshad et al. [34], Chaudhary et al. [35], and Ever et al. [27]. The comparison focuses on computational and communication overheads, as well as the security features provided by each protocol. ...