Internet of Things architecture and applications: a survey T Ara, PG Shah, M Prabhakar Indian Journal of Science and Technology 9 (45), 1-7, 2016 | 33 | 2016 |
Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange X Huang, PG Shah, D Sharma 2010 Fourth International Conference on Network and System Security, 588-593, 2010 | 33 | 2010 |
Analytical study of implementation issues of Elliptical Curve Cryptography for Wireless Sensor networks PG Shah, X Huang, D Sharma 2010 IEEE 24th International Conference on Advanced Information Networking …, 2010 | 31 | 2010 |
Revisting of elliptical curve cryptography for securing Internet of Things (IOT) DP Shah, PG Shah 2018 Advances in Science and Engineering Technology International …, 2018 | 30 | 2018 |
Multi-agent system protecting from attacking with elliptic curve cryptography X Huang, PG Shah, D Sharma Advances in Intelligent Decision Technologies: Proceedings of the Second KES …, 2010 | 26 | 2010 |
Security with ip address assignment and spoofing for smart iot devices S Rajashree, KS Soman, PG Shah 2018 international conference on advances in computing, communications and …, 2018 | 23 | 2018 |
Fast algorithm in ECC for wireless sensor network X Huang, P Shah, D Sharma Proceedings of the International MultiConference of Engineers and Computer …, 2010 | 20 | 2010 |
IoT and block chain driven intelligent transportation system P Manjunath, R Soman, PG Shah 2018 Second International Conference on Green Computing and Internet of …, 2018 | 18 | 2018 |
Dynamic key dependent S-Box for symmetric encryption for IoT devices T Ara, PG Shah, M Prabhakar 2018 Second International Conference on Advances in Electronics, Computers …, 2018 | 17 | 2018 |
Advances in intelligent decision technologies: Proceedings of the Second KES International Symposium IDT 2010 G Phillips-Wren Springer Science & Business Media, 2010 | 17 | 2010 |
Algorithm based on one's complement for fast scalar multiplication in ECC for wireless sensor network PG Shah, X Huang, D Sharma 2010 IEEE 24th International Conference on Advanced Information Networking …, 2010 | 16 | 2010 |
Minimizing hamming weight based on 1's complement of binary numbers over GF(2m) X Huang, PG Shah, D Sharma 2010 The 12th International Conference on Advanced Communication Technology …, 2010 | 16 | 2010 |
Sliding window method with flexible window size for scalar multiplication on wireless sensor network nodes. PG Shah, X Huang, D Sharma 2010 International Conference on Wireless Communication and Sensor Computing …, 2010 | 15 | 2010 |
IoT based food wastage management system P Manjunath, PG Shah 2019 Third international conference on I-SMAC (IoT in social, mobile …, 2019 | 14 | 2019 |
Fast scalar multiplication for elliptic curve cryptography in sensor networks with hidden generator point X Huang, PG Shah, D Sharma 2010 International Conference on Cyber-Enabled Distributed Computing and …, 2010 | 13 | 2010 |
IoT driven with big data analytics and block chain application scenarios P Manjunath, MK Prakruthi, PG Shah 2018 Second International Conference on Green Computing and Internet of …, 2018 | 8 | 2018 |
Energy efficient secured cluster based distributed fault diagnosis protocol for IoT T Ara, M Prabhkar, PG Shah International Journal of Communication Networks and Information Security 10 …, 2018 | 7 | 2018 |
Investigating effects of co-ordinate system on execution time of elliptical curve protocol in wireless sensor networks PG Shah 2012 International Conference on Future Communication Networks, 153-158, 2012 | 7 | 2012 |
Security model for internet of things end devices S Rajashree, PG Shah, S Murali 2018 IEEE international conference on internet of things (iThings) and IEEE …, 2018 | 6 | 2018 |
Optus data breach australia year 2022–case study PG Shah Australian Journal of Wireless Technologies, Mobility and Security 1, 2022 | 5 | 2022 |