A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS C Lepore, M Ceria, A Visconti, UP Rao, KA Shah, L Zanolini Mathematics 8 (10), 1782, 2020 | 114 | 2020 |
[Retracted] An Improved Secure Key Generation Using Enhanced Identity‐Based Encryption for Cloud Computing in Large‐Scale 5G RK Gupta, KK Almuzaini, RK Pateriya, K Shah, PK Shukla, R Akwafo Wireless Communications and Mobile Computing 2022 (1), 7291250, 2022 | 43 | 2022 |
Exploring applications of blockchain technology for Industry 4.0 K Shah, N Patel, J Thakkar, C Patel Materials Today: Proceedings 62, 7238-7242, 2022 | 27 | 2022 |
Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks K Shah, D Jinwala Frontiers of Computer Science 15 (6), 156813, 2021 | 23 | 2021 |
Privacy preserving, verifiable and resilient data aggregation in grid-based networks KA Shah, DC Jinwala The Computer Journal 61 (4), 614-628, 2018 | 21 | 2018 |
A review on blockchain technology: Components, issues and challenges V Patel, F Khatiwala, K Shah, Y Choksi ICDSMLA 2019: Proceedings of the 1st International Conference on Data …, 2020 | 18 | 2020 |
Machine-learning techniques for predicting phishing attacks in blockchain networks: A comparative study K Joshi, C Bhatt, K Shah, D Parmar, JM Corchado, A Bruno, PL Mazzeo Algorithms 16 (8), 366, 2023 | 13 | 2023 |
Novel approach for pre-distributing keys in WSNs for linear infrastructure KA Shah, DC Jinwala Wireless Personal Communications 95, 3905-3921, 2017 | 13 | 2017 |
A secure expansive aggregation in wireless sensor networks for linear infrasturcture K Shah, DC Jinwala 2016 IEEE Region 10 Symposium (TENSYMP), 207-212, 2016 | 13 | 2016 |
A systematic review of decentralized finance protocols K Shah, D Lathiya, N Lukhi, K Parmar, H Sanghvi International Journal of Intelligent Networks, 2023 | 12 | 2023 |
Exploring security threats on blockchain technology along with possible remedies S Sharma, K Shah 2022 IEEE 7th International conference for Convergence in Technology (I2CT), 1-4, 2022 | 12 | 2022 |
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR NETWORKS K Shah, DC Jinwala Computer Science & Information Technology (Cryptography and Information …, 2018 | 10 | 2018 |
Privacy-preserving e-voting system through blockchain technology J Thakkar, N Patel, C Patel, K Shah 2021 IEEE International Conference on Technology, Research, and Innovation …, 2021 | 7 | 2021 |
IoT Forensics System based on Blockchain Y Makadiya, R Virparia, K Shah 2023 10th International Conference on Computing for Sustainable Global …, 2023 | 6 | 2023 |
DAMBNFT: Document Authentication Model through Blockchain and Non-fungible Tokens U Khokhariya, K Shah, N Pancholi, S Kumar Smart Trends in Computing and Communications: Proceedings of SmartCom 2022, 347, 2022 | 6 | 2022 |
Novel approach of key predistribution for grid based sensor networks KA Shah, DC Jinwala Wireless Personal Communications 108, 939-955, 2019 | 6 | 2019 |
An exploration to the quantum cryptography technology H Jasoliya, K Shah 2022 9th International Conference on Computing for Sustainable Global …, 2022 | 4 | 2022 |
Exploring Cyber Security Issues in the Internet of Healthcare Things (IoHT) with Potential Improvements M Surti, V Shah, Y Makadiya, K Shah, M Padhya Information and Communication Technology for Competitive Strategies (ICTCS …, 2023 | 3 | 2023 |
Securing cookies/sessions through non-fungible tokens K Shah, U Khokhariya, N Pancholi, S Kumar, K Parmar international conference on database systems for advanced applications, 135-146, 2022 | 3 | 2022 |
Exploring the access control policies of web-based social network K Shah, D Patel ICDSMLA 2019: Proceedings of the 1st International Conference on Data …, 2020 | 3 | 2020 |