Human activity recognition: A survey C Jobanputra, J Bavishi, N Doshi Procedia Computer Science 155, 698-703, 2019 | 288 | 2019 |
Security and privacy issues in cloud, fog and edge computing S Parikh, D Dave, R Patel, N Doshi Procedia Computer Science 160, 734-739, 2019 | 110 | 2019 |
A novel MQTT security framework in generic IoT model C Patel, N Doshi Procedia Computer Science 171, 1399-1408, 2020 | 75 | 2020 |
Voice-controlled autonomous vehicle using IoT S Sachdev, J Macwan, C Patel, N Doshi Procedia Computer Science 160, 712-717, 2019 | 68 | 2019 |
Blockchain-based IoT: A survey R Thakore, R Vaghashiya, C Patel, N Doshi Procedia computer science 155, 704-709, 2019 | 58 | 2019 |
A survey on blockchain technology and its proposed solutions D Dave, S Parikh, R Patel, N Doshi Procedia Computer Science 160, 740-745, 2019 | 55 | 2019 |
A survey of smart city infrastructure via case study on New York J Shah, J Kothari, N Doshi Procedia Computer Science 160, 702-705, 2019 | 49 | 2019 |
Security challenges in IoT cyber world C Patel, N Doshi Security in smart cities: models, applications, and challenges, 171-191, 2019 | 49 | 2019 |
Fully secure ciphertext policy attribute‐based encryption with constant length ciphertext and faster decryption N Doshi, DC Jinwala Security and Communication Networks 7 (11), 1988-2002, 2014 | 45 | 2014 |
Social implications of smart cities Y Patel, N Doshi Procedia Computer Science 155, 692-697, 2019 | 44 | 2019 |
Analysis of robust weed detection techniques based on the Internet of Things (IoT) F Dankhara, K Patel, N Doshi Procedia Computer Science 160, 696-701, 2019 | 42 | 2019 |
Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext N Doshi, D Jinwala International Conference on Advanced Computing, Networking and Security, 515-523, 2011 | 39 | 2011 |
A CNN-BiLSTM based Approach for Detection of SQL Injection Attacks N Gandhi, J Patel, R Sisodiya, N Doshi, S Mishra 2021 International Conference on Computational Intelligence and Knowledge …, 2021 | 38 | 2021 |
Python: the most advanced programming language for computer science applications AJ Dhruv, R Patel, N Doshi Science and Technology Publications, Lda, 292-299, 2021 | 37 | 2021 |
An analytical study of biometric based remote user authentication schemes using smart cards T Limbasiya, N Doshi Computers & Electrical Engineering 59, 305-321, 2017 | 34 | 2017 |
A Comparative study of applications of Game Theory in Cyber Security and Cloud Computing. V Kakkad, H Shah, R Patel, N Doshi Procedia Computer Science 155, 680-685, 2019 | 32 | 2019 |
FMD and mastitis disease detection in cows using Internet of Things (IOT) S Vyas, V Shukla, N Doshi Procedia Computer Science 160, 728-733, 2019 | 26 | 2019 |
Secure lightweight key exchange using ECC for user-gateway paradigm C Patel, N Doshi IEEE Transactions on Computers 70 (11), 1789-1803, 2020 | 25 | 2020 |
Survey-pollution monitoring using IoT J Arora, U Pandya, S Shah, N Doshi Procedia Computer Science 155, 710-715, 2019 | 24 | 2019 |
Improving security in multi authority attribute based encryption with fast decryption N Gorasia, RR Srikanth, N Doshi, J Rupareliya Procedia Computer Science 79, 632-639, 2016 | 24 | 2016 |