1. F. Hassana, V. Kumar∗, A. K. Nishad, V. Gautam (2024), “Investigation of Digital Twin Technology for Secure and Privacy Preserving Networking” 3rd International Conference on Evolutionary Computing and Mobile Sustainable Networks (ICECMSN 2023), Procedia Computer Science, (Scopus Indexed).
2. F. Hassan, V. Kumar, A. K. Nishad (2023), International conference on Artificial Intelligence and Information Technologies (ICAIIT 2023) accepted (Scopus Indexed).
3. K. Kumar, V. Kumar, Seema (2023), “Integration of Artificial Intelligence and Machine Learning for Internet of Things” in International Conference on Sustainable Communication Networks and Application (ICSCNA 2023), Bharath Niketan Engineering College, Theni, Tamil Nadu, India (Scopus Indexed).
4. K. Kumar, V. Kumar, Seema (2023), “Investigation of Digital Twin Technology for Secure and Privacy Preserving Networking”, International Conference on Trends in Sustainable Computing and Machine Intelligence (ICTSM 2023) accepted (Scopus Indexed).
5. K. Kumar, V. Kumar, Seema (2023) “ Use of Cryptography in Networking to Preserve Secure Systems” Intelligent Data Analytics, IoT, and Blockchain, Boca Raton, CRC Press, Taylor & Francis.
6. P. K. Raut, S. P. Behera, D. Mishra, V. Kumar, K. L. Mahanta (2023)“Fuzzy Minimum Spanning Tree Calculation-Based Approach on Acceptability Index Method”, Intelligent Data Analytics, IoT, and Blockchain 1, 11, Boca Raton, CRC Press , Taylor & Francis.
7. K. Kumar, V. Kumar*, Seema (2022) “ Security and Privacy Preservation for Data Communication Network”, 4th International Conference on Innovative Data Communication Technology and Application, Procedia Computer Science, 215, 1-7, https://doi.org/10.1016/j.procs.2022.12.001(Scopus Indexed)
8. V. Kumar, R. Kumar, V. Kumar*, A. Kumari, (2022) “Cryptanalysis of RFID Mutual Authentication Protocol for IoT”, Smart Data Intelligence, 173-183, Algorithms for Intelligent Systems, Springer, Singapore. https://doi.org/10.1007/978-981-19-3311-0_15 (Scopus Indexed)
9. A. Kumar, S. Yadav, V. Kumar*, S. Jangirala (2022), “A Cluster-based Data Aggregation Framework for WSN using Blockchain”, Evolutionary Computing and Mobile Sustainable Networks. Lecture Notes on Data Engineering and Communications Technologies, vol 116. Springer, Singapore. https://doi.org/10.1007/978-981-16-9605-3_43 (Scopus Indexed)
10. A.A. Khan, S. Itoo, V. Kumar*, M. Ahmad, and S. Jangirala (2022), “Cryptanalysis and design flaws of anonymous ECC based self-certified key distribution scheme for smart grid”, Materials Today: Proceedings ” (Scopus Indexed), https://doi.org/10.1016/j.matpr.2021.12.257
11. S. Itoo, , V. Kumar*, A. A. Khan, M. Ahmad and G. Singh, “ Cryptanalysis and Suggested Improvement of “Lightweight Mutual Authentication Strategy for Internet of Electric Things””, accepted for publication in International Conference on Innovation and Application in Science & Technology(ICIAST-2021), Galgotias College of Engineering & Technology, Plot-1, Knowledge Park- II, Greater Noida, Uttar Pradesh, India (Scopus Indexed).
12. V. Kumar*, S. Jangirala, H. Pratap and A. Kumari, “Design Flaws and Cryptanalysis of a Lightweight Mutual Authentication Protocol for V2V Communication in Internet of Vehicles”, accepted for publication 3rd International Conference on Machine Learning, Advances in Computing, Renewable Energy and Communication, Krishna Engineering College, Ghaziabad, (UP), INDIA. (Accepted) (Scopus Indexed).
13. S. Itoo, A.A. Khan, V. Kumar*, S. Jangirala, and M. Ahmad (2021), “Design Flaws and Suggested Improvement of Secure Medical Data Sharing Scheme Based on Blockchain”, Springer Lecture Notes on Data Engineering and Communications Technologies Series Editor: Xhafa, Fatos ISSN: 2367-4512” (Accepted) (Scopus Indexed)
14. A. Iqbal, A.A. Khan, V. Kumar, M. Ahmad (2021), “A Mutual Authentication and Key Agreement Protocol for Vehicle to Grid Technology”, Innovations in Electrical and Electronic Engineering book series, 863-875, (Scopus Indexed), https://doi.org/10.1007/978-981-16-0749-3_66
15. V. Kumar*, M. Ahmad (2020), “An Efficient Identity-Based Mutual Authentication Protocol for Cloud Computing”, Computational Science and its Applications, Chapman and Hall/CRC, 233-241, DOI: 10.1201/9780429288739-15 & eBook ISBN: 9780429288739
16. V. Kumar*, A.A. Khan and M. Ahmad (2019), “Design Flaws and Cryptanalysis of Elliptic Curve Cryptography- Based Lightweight Authentication Scheme for Smart Grid Communication”, Advances in Data Sciences, Security and Applications, Lecture Notes in Electrical Engineering, 169-179, (Scopus Indexed), https://doi.org/10.1007/978-981-15-0372-6_13
17. A Kumari, M.Y. Abbasi, V. Kumar*, M Alam (2019), “Design Flaws and Cryptanalysis of a Standard Mutual Authentication Protocol for Cloud Computing-Based Healthcare System”, Advances in Data Sciences, Security and Applications, Lecture Notes in Electrical Engineering, 99-109, (Scopus Indexed), DOI:10.1007/978-981-15- 0372-6_8
18. V. Kumar*, M. Ahmad and P. Kumar (2019), “An Identity-Based Authentication Framework for Big Data Security”. Proceedings of 2nd International Conference on Communication, Computing and Networking in Lecture Notes in Networks and Systems, 63-71, (Scopus Indexed), https://doi.org/10.1007/978-981-13-1217-5_7
19. A. Kumari, M. Y. Abbasi, V. Kumar*, and M. Alam (2018), “The Cryptanalysis of a Secure Authentication Scheme Based on Elliptic Curve Cryptography for IOT and Cloud Servers”, in IEEE, ICACCCN- 2018, pp: 321- 324, (Scopus Indexed), DOI: 10.1109/ICACCCN.2018.8748591
20. D. Mishra, V. Kumar and S. Mukhopadhyay (2013), “A Pairing-Free Identity Based Authentication Framework for Cloud Computing”, LNCS 7873, pp: 721727, (Scopus Indexed), https://doi.org/10.1007/978-3-642-38631- 2_62