IBOOST: a lightweight provably secure identity-based online/offline signature technique based on FCM for massive devices in 5G wireless sensor networks

C Meshram, AL Imoize, A Elhassouny, A Aljaedi… - IEEE …, 2021 - ieeexplore.ieee.org
The fifth-generation (5G) wireless network is commercialized. The need to integrate massive
devices in 5G and wireless sensor networks (WSN) to provide several convenient services …

OOS-SSS: An efficient online/offline subtree-based short signature scheme using Chebyshev chaotic maps for wireless sensor network

C Meshram, CC Lee, SG Meshram, A Meshram - IEEE Access, 2020 - ieeexplore.ieee.org
Wireless sensor network (WSN) is a network system that involves spatially distributed
devices such as wireless sensor nodes. As the data collected by the sensor nodes and …

Anonymous certificateless multi-receiver encryption scheme for smart community management systems

L Deng - Soft Computing, 2020 - Springer
In community management services, it is a common requirement for management centers to
send the same encrypted message to some units and individuals in the community, while …

A provably secure lightweight subtree-based short signature scheme with fuzzy user data sharing for human-centered IoT

C Meshram, A Alsanad, JV Tembhurne… - IEEE …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is made up of various smart devices for the exchange of sensed data
through online services. Direct contact with people through smart devices to define …

An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment

C Meshram, CC Lee, SG Meshram, MK Khan - Soft computing, 2019 - Springer
The advancement of the cloud storage technology opens up a wide range of possibilities for
adaptable data sharing. When sharing data to an extensive number of users with fuzzy …

[PDF][PDF] SBOOSP for Massive Devices in 5G WSNs Using Conformable Chaotic Maps.

C Meshram, AL Imoize, SS Jamal… - … , Materials & Continua, 2022 - researchgate.net
The commercialization of the fifth-generation (5G) wireless network has begun. Massive
devices are being integrated into 5G-enabled wireless sensor networks (5G WSNs) to …

An efficient mobile-healthcare emergency framework

C Meshram, CC Lee, SG Meshram, RJ Ramteke… - Journal of medical …, 2020 - Springer
Mobile technologies are capable of offering individual level health care services to users.
Mobile Healthcare (m-Healthcare) frameworks, which feature smartphone (SP) utilizations of …

An effective fair off-line electronic cash protocol using extended chaotic maps with anonymity revoking trustee

C Meshram, MS Obaidat, KF Hsiao… - 2021 International …, 2021 - ieeexplore.ieee.org
Along with the proliferation of cyberspace and the beginning of electronic trade, many
electronic cash protocols were suggested. Electronic cash allows digital coins to be …

[HTML][HTML] An efficient electronic cash system based on certificateless group signcryption scheme using conformable chaotic maps

C Meshram, AL Imoize, A Aljaedi, AR Alharbi… - Sensors, 2021 - mdpi.com
Signcryption schemes leveraging chaotic constructions have garnered significant research
interest in recent years. These schemes have proffered practical solutions towards …

CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique Based on Fractional Chaotic Maps

C Meshram, AL Imoize, SS Jamal, AR Alharbi… - IEEE …, 2022 - ieeexplore.ieee.org
In recent years, there has been a lot of research interest in analyzing chaotic constructions
and their associated cryptographic structures. Compared with the essential combination of …