PUBLICATIONS
Home Short Bio Research Publications Services Teaching Supervision
RESEARCH PUBLICATIONS
BOOK/CHAPTER PUBLISHED
2022: R. Aljohani, N. Saxena, and R. S. Bhadoria, “Security Issues and Challenges in Cloud Computing,” In: Alharahsheh, Husam H. and Mazumdar, Anupam eds. Handbook of Research on Cloud Computing Applications in SMES, IGI Global, 2022.
2020: K. Adewole, N. Saxena, and S. Bhadauria, “Application of Cryptocurrencies using Blockchain for E-Commerce Online Payment,” Blockchain for Cybersecurity and Privacy: Architectures, Challenges and Applications, C&C Press, 2020.
2019: N. Saxena, R. S. Bhadoria, S. Dickerson, S. Branch, L. Dalley, and N. Churchill, “Security and Privacy Issues in UK Healthcare,” Security and Privacy of Electronic Healthcare Records: Concepts, Paradigms and Solutions, IET, 2019.
2019: R. S. Bhadoria, A. Nimbalkar, and N. Saxena, “On the Role of Blockchain Technology in Internet of Things,” Advanced Applications of Blockchain Technology, Springer, 2019, pp. 129-140.
2009: N. Saxena, P. Patel, A. Agarwal, and S. Agarwal, “Comprehensive Guide, Computer Science / Information Technology” 4th Semester UPTU, Sun India publication, Delhi, India, 1st Edition, Pages 345.
2008-09: N. Saxena and K. K. Saxena, “Operations Research” Shubham publication, Delhi, India, 1st Edition, Pages 270.
2021: Report on Cyber-Risks Assessment and Threat Modelling for Energy Load Forecasting in Pandemic Situations
![](https://www.google.com/images/icons/product/drive-32.png)
INTERNATIONAL JOURNAL PUBLICATIONS
2024: D. S. Afenu, M. Asiri, and N. Saxena, "Industrial control systems security validation based on MITRE adversarial tactics, techniques, and common knowledge framework" Electronics 13(5), article number: 917.
2023: M. N. Nafees, N. Saxena, A. Cardenas, S. Grijalva, and P. Burnap, “Smart grid cyber-physical situational awareness of complex operational technology attacks: A review,” ACM Computing Survey, 55(10), 2023, pp. 1-36. [media coverage here]
[ACM Computing Survey is ranked #10 on Google Scholar h5-index under 'Engineering and Computer science - general]
2023: Y. Alrowaili, N. Saxena, A. Srivastava, M. Conti, and P. Burnap, "Review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification," IET Cyber-Physical Systems: Theory & Applications, 2023.
2023: M. Asiri, N. Saxena, R. Gjomemo, and P. Burnap, "Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective," ACM Transactions on Cyber-Physical Systems 7(2), 2023, pp. 1-33.
2023: A. S. Mohammed, E. Anthi, O. Rana, N. Saxena, and P. Burnap, Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication. Computers and Security 124, 2023, article number: 103007.
[Computer and Security is ranked #5 by Google Scholar h5-index under 'Computer Security and Cryptography']
2023: A. Rotibi, N. Saxena, P. Burnap, and A. Tartar, Extended dependency modelling technique for cyber risk identification in ICS. IEEE Access 11, pp. 37229-37242.
[IEEE Access is ranked #1 on Google Scholar h5-index under 'Engineering and Computer science - general]
2022: M. Althunayyan, N. Saxena, S. Li, and P. Gope, “Evaluation of Black-Box Web Application Security Scanners in Detecting Injection Vulnerabilities,” Electronics (MDPI), SI: Design of Intelligent Intrusion Detection Systems, 2022. (IF: 2.397)
2022: G. Verma, P. Gope, N. Saxena, and N. Kumar, “CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid,” IEEE Transactions on Dependable and Secure Computing, 2022. (IF: 7.329)
[IEEE Transactions on Dependable and Secure Computing is ranked #7 by Google Scholar h5-index under 'Computer Security and Cryptography']
2022: S. Li, M. Iqbal, and N. Saxena, “Future Industry Internet of Things with Zero-trust Security,” Information Systems Frontiers, March 2022, pp. 1-15. (IF: 6.191)
2022: J. C. Merlino, M. Asiri, and N. Saxena, “DDoS Cyber-Incident Detection in Smart Grid,” Sustainability (MDPI), SI: Securing Smart Grid Cyber-Physical Infrastructure against Emerging Threats, 2022. (IF: 3.251)
2022: S. S. Ali, I. I. Ganapathi, N. S. Vu, N. Saxena, S. D. Ali, N. Werghi, “Image Forgery Detection Using Deeplearning by Recompressing the Images,” Electronics (MDPI), SI: Data Driven Security, 2022. (IF: 2.397)
2021: A. Kumar, N. Saxena, S. Jung, and B. J. Choi, “Improving Detection of False Data Injection Attacks Using Machine Learning with Feature Selection and Oversampling,” Electronics (MDPI), SI: Machine Learning and Data Mining Applications in Power Systems, 15(1), 2021. (IF: 2.397)
2021: N. Saxena, L. Xiong, V. Chukwuka, and S. Grijalva, “Impact Evaluation of Malicious Control Commands in Cyber-Physical Smart Grids," IEEE Transactions on Sustainable Computing, 6(2), Jun. 2021.
2021: F. Orr, M. N. Nafees, N. Saxena, and B. J. Choi, “Securing Publisher–Subscriber Smart Grid Infrastructure,” Electronics (MDPI), SI: Cyber-Physical Security in Smart Grids: System Analysis and Control Design, 10(19), 2355, 2021. (IF: 2.397)
2021: C. Liu, Y. Alrowaili, N. Saxena, and C. Konstantinou, “Cyber Risks to Critical Smart Grid Assets of Industrial Control Systems,” Energies (MDPI), SI: Big Data and Advanced Analytics in Energy Systems and Applications, 2021. (IF: 3.004)
2021: G. Burke and N. Saxena, “Cyber Risks Prediction and Analysis in Medical Emergency Equipment for Situational Awareness,” Sensors (MDPI), SI: Cyber Situational Awareness in Computer Networks, 2021. (IF: 3.576)
2021: N. Chugh, G. S. Tomar, R. S. Bhadoria, and N. Saxena, “A Novel Anomaly Behavior Detection Scheme for Mobile Ad Hoc Networks,” Electronics (MDPI), SI: Data-Driven Security, 2021. (IF: 2.397)
2021: U. Sharma, P. Tomar, S. S. Ali, N. Saxena, and R. S. Bhadoria, “Optimized Authentication System with High Security and Privacy,” Electronics (MDPI), Special Issue: Cyber Security for Wireless Networks, 2021. (IF: 2.397)
2021: S. M. Karunarathne, N. Saxena, and M. K. Khan, “Security and Privacy in IoT Smart Healthcare,” IEEE Internet Computing, 2021. (IF: 4.231)
2021: P. Gope, O. Millwood, and N. Saxena, “A Provably Secure Authentication Scheme for RFID-enabled UAV Applications,” Computer Communications, Vol. 166, 2021, pp. 19-25. (IF: 3.167)
[Computer Communications is ranked #13 by Google Scholar h5-index under 'Computer networks and Wireless Communication']
2020: N. Saxena, E. Hayes, E. Bertino, P. Ojo, K.-K. R. Choo, and P. Burnap, “Impact and Key Challenges of Insider Threats in Government Organizations and Critical Businesses,” Electronics (MDPI), Vol. 9, No. 9, 1460, Aug. 2020, pp. 1-29. (IF: 2.412) [In news: "Wired"] [More here]
2020: Y.-H. Tung, H.-C. Wei, Y.-W. Ti, Y.-T. Tsou, N. Saxena and C.-M. Yu, “Counteracting UDP Flooding Attacks in SDN,” Electronics (MDPI), Vol. 9, No. 8, Jul 2020. (IF: 2.412)
2020: N. Saxena, A. A. Cardenas, R. Beyah, R. Lu, K.-K. R. Choo, and Y. Chen, “Introduction to the Special Issue on User-Centric Security and Safety for CPS,” ACM Trans. Cyber-Phys. Syst., Vol. 4, No. 3, Article 29, May 2020.
2020: N. Saxena, I. Thomas, P. Gope, P. Burnap, and N. Kumar, “PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs,” IEEE Computer, 2020. (IF: 3.564) [Featured on the Front Page]
2019: N. Saxena, M. Conti, K.-K. R. Choo, and N. S. Chaudhari, “BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices," IEEE Transactions on Information Forensics and Security, Sep. 2019 (pub: 2020), 15, pp. 1470-1485. (IF: 7.178)
2018: N. Saxena, H. Shen, N. Komninos, K.-K. R. Choo, and N. S. Chaudhari, “BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users,” IEEE Transactions on Dependable and Secure Computing, 2018, (pub: 2020) 17(3), pp. 550-565. (IF: 7.329)
2018: R. Chaudhary, A. Jindal, G. S. Aujla, N. Kumar, A. K. Das, and N. Saxena, “LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment,” IEEE Communications Magazine, 56(4), Apr. 2018, pp. 24-32. (IF: 10.435)
[IEEE Communications Magazine is ranked #4 by Google Scholar h5-index under 'Computer networks and Wireless Communication']
2018: N. Saxena and S. Grijalva, “Efficient Signature Scheme for Delivering Authentic Control Commands and Alert Messages in the Smart Grid,” IEEE Transactions on Smart Grid, 9(5), Sep. 2018, pp. 4323-4334. (IF: 10.49)
[IEEE Transactions on Smart Grid is ranked #1 by Google Scholar h5-index under 'Power Engineering']
2018: N. Saxena, B. J. Choi, “Integrated Lightweight Authentication Protocol for Smart Grid Communications,” IEEE Systems Journal, 12(3), Sep. 2018, pp. 2545-2556. (IF: 4.463)
[IEEE Systems Journal is ranked #16 by Google Scholar h5-index under 'Computer networks and Wireless Communication']
2017: N. Saxena, S. Grijalva, V. Chukwuka, and A. Vasilakos, “Network Security and Privacy Challenges in Smart Vehicle-to-Grid,” IEEE Wireless Communications, 24(4), Aug. 2017, pp. 88-98. (IF: 11.979)
[IEEE Wireless Communications is ranked #8 by Google Scholar h5-index under 'Computer networks and Wireless Communication']
2017: N. Saxena and S. Grijalva, “Dynamic Secrets and Secret Keys Based Scheme for Securing Last Mile Smart Grid Wireless Communication,” IEEE Transactions on Industrial Informatics, SI: New Perspectives on Wireless Communications in Automation: From Industrial Monitoring and Control to Cyber-Physical Systems, 13(3), Jun. 2017, pp. 1482-1491. (IF: 10.215)
[IEEE Transactions on Industrial Informatics is ranked #5 on Google Scholar h5-index under 'Engineering and Computer science - general]
2016: N. Saxena, S. Grijalva, and N. S. Chaudhari, “Authentication protocol for an IoT-enabled LTE network,” ACM Transactions on Internet Technology (TOIT), Special Section - Internet of Things (IoT): Secure Service Delivery, 16 (4), Dec. 2016. (IF: 2.382)
2016: N. Saxena and B. J. Choi, “Authentication Scheme for Flexible Charging and Discharging of Mobile Vehicles in the V2G Networks,” IEEE Transactions on Information Forensics and Security, 11(7), July 2016, 1438-1452. (IF: 7.178)
2016: N. Saxena, B. J. Choi, and R. Lu, “Authentication and Authorization Scheme for Various User-Roles and Devices in Smart Grid,” IEEE Transactions on Information Forensics and Security, 11(5), May 2016, 907-921. (IF: 7.178) [Ref by 1 Patent] [More here]
2015: N. Saxena and B. J. Choi, “State of Art Authentication, Integration, and Access Control in Smart Grid,” Energies (MDPI), vol. 8, no. 10, 2015, pp. 11883-11915. (IF: 3.004) [Ref by 1 Patent] [More here]
2015: N. Saxena, J. Thomas, and N. S. Chaudhari, “ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks,” Wireless Personal Communication, Springer, 84(3,) Apr. 2015, 1981-2012. (IF: 1.67) [Ref by 1 Patent] [More here]
2014: N. Saxena and N. S. Chaudhari, “EasySMS: A Protocol for End-to-End Secure Transmission of SMS,” IEEE Transactions on Information Forensics and Security (TIFS), IEEE, 9(7), July 2014, 1157-1168. (IF: 7.178)
[IEEE Transactions on Information Forensics and Security is ranked #2 by Google Scholar h5-index under 'Computer Security and Cryptography']
2014: N. Saxena and N. S. Chaudhari, “Secure-AKA: An Efficient AKA Protocol for UMTS Networks,” Wireless Personal Communication (WPC), Springer, 78(2), 2014, 1345-1373. (IF: 1.67)
[Wireless Personal Communication is ranked #18 by Google Scholar h5-index under 'Computer networks and Wireless Communication']
2014: N. Saxena and N. S. Chaudhari, “SecureSMS: A Secure SMS Protocol for VAS and Other Applications,” Journal of Systems and Software (JSS), Elsevier, April 2014, 90, 138–150. (IF: 2.829)
[Journal of Systems and Software is ranked #3 by Google Scholar h5-index under 'Software Systems']
2013: N. Saxena and N. S. Chaudhari, “SAKA: A Secure Authentication and Key Agreement Protocol for GSM Networks,” CSI Transactions on ICT (CSIT), Springer, December 2013, 1(4), 331-341.
2013: N. Saxena and N. S. Chaudhari, “An Enhanced NPA Protocol for Secure Communications in GSM Network,” International Journal of Security and Networks (IJSN), Inderscience, 2013, 8(1), 13-28.
2013: N. Saxena and N. S. Chaudhari, “Prevention of SMS against Repudiation Attack over the GSM Network,” Journal of Information Assurance and Security (JIAS), MIR Labs, 8(3), 2013, 156-166.
2012: N. Saxena and N. S. Chaudhari, “An Approach for SMS Security using Authentication Functions,” International Journal of Computer Application (IJCA), IJCA Special Issue on Communication Security comnetcs(1), published by Foundation of Computer Science, New York, USA, March 2012, 6-8.
2011: N. Saxena and N. S. Chaudhari, “A Secure Digital Signature Approach for SMS Security,” International Journal of Computer Application (IJCA), Special issues on IP Multimedia Communications, published by Foundation of Computer Science, New York, USA, October 2011, 98-102.
2011: N. Saxena and A. Payal, “Enhancing Security System of Short Message Service for M-Commerce in GSM,” The International Journal of Computer Science & Emerging Technologies (IJCSET), 2(4), April 2011, 126-133.
2010: N. Saxena and K. K. Saxena, “Fuzzy Logic Based Students Performance Analysis Model for Educational Institutions,” International Journal of Research IMSEC-IJR, IMSEC Ghaziabad, India, 1, 2010, pp. 79-86.
INTERNATIONAL/NATIONAL CONFERENCE PROCEEDINGS
2023: M. N. Nafees, N. Saxena, and P. Burnap, POSTER: Adaptive moving target defense: Enhancing dynamic perturbation through voltage sensitivity analysis in power systems. 21st International Conference on Applied Cryptography and Network Security (ACNS 2023), Kyoto, Japan, 19-22 June 2023.
2023: M. Asiri, N. Saxena, and P. Burnap, Advancing resilience of cyber-physical smart grid: An integrated co-simulation approach incorporating indicators of compromise. Presented at: International Workshop on Re-design Industrial Control Systems with Security (RICSS) in conjunction with IEEE EuroS&P, Delft, Netherlands, 3-7 July 2023.
2023: A. Rotibi, N. Saxena, and P. Burnap, Poster: Using causal inference to extract hidden information from dependency modelling. Presented at: IEEE European Symposium on Security and Privacy (Euro S&P), Delft, Netherlands, 3-7 July 2023.
[IEEE European Symposium on Security and Privacy is ranked #14 by Google Scholar h5-index under 'Computer Security and Cryptography']
2023: N. Saxena, C. Potter, and S. Maity, “Clarity: Analysing Security in Web Applications,” COMSNET, Bengaluru, India, 3-7 Jan 2023.
2022: M. N. Nafees, N. Saxena, and P. Burnap, “Physics-Informed Augmentation for Contextual Anomaly Detection in Smart Grid, ACM CCS, Los Angeles, USA, 2022.
2022: M. N. Nafees, N. Saxena, and P. Burnap, “On the Efficacy of Physics-Informed Context-Based Anomaly Detection for Power Systems,” IEEE SmartGridComm, Singapore, 2022.
2022: K. Prateek, S. Maity, and N. Saxena, “A Quantum Communication Based Secure Road Condition Monitoring Application in Intelligent Internet of Vehicular Things,” 19th India Council IEEE International Conference INDICON, Cochin, Kerala, 24-26 Nov. 2022.
2022: R. Khan, N. Saxena, O. Rana, and P. Gope, “ATVSA: Driver Profiling for Situational Awareness”, IEEE European Security and Privacy Workshop (Automotive Cyber Security), Genoa, Italy, 6-10 Jun. 2022.
2022: A. S. Mohammed, N. Saxena, and O. Rana, “Wheels on the Modbus - Attacking ModbusTCP Communications,” ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), San Antonio, USA, 16-19 May 2022.
2021: M. N. Nafees, N. Saxena, and P. Burnap, “Optimized Predictive Control for AGC Cyber Resiliency,” 28th ACM Conference on Computer and Communications Security (ACM CCS), 15-19 Nov. 2021.
2021: Y. Alrowaili, N. Saxena, and P. Burnap, “Determining Asset Criticality in Cyber-Physical Smart Grid ,” 26th European Symposium on Research in Computer Security (ESORICS), 4-8 Oct. 2021.
2021: M. Asiri, N. Saxena, and P. Burnap, “Investigating Usable Indicators against Cyber-Attacks in Industrial Control Systems,” 17th USENIX Symposium on Usable Privacy and Security (SOUPS), 8-10 Aug. 2021.
[USENIX Symposium on Usable Privacy and Security (SOUPS) is ranked #17 by Google Scholar h5-index under 'Computer Security and Cryptography']
2021: A. Kumar, N. Saxena, and B. J. Choi, “FedTLG: Federated Learning using Trusted Local Groups,” 16th ACM ASIA Conference on Computer and Communications Security (ACM AsiaCCS), 7-11 Jun. 2021.
[ACM Asia Conference on Computer and Communications Security (AsiaCCS) is ranked #16 by Google Scholar h5-index under 'Computer Security and Cryptography']
2021: M. N. Nafees, N. Saxena, and P. Burnap, “Specification-Based Process Control Attack Detection in Substation Automation,” 42nd IEEE Symposium on Security and Privacy (S&P), 2021.
[IEEE Symposium on Security and Privacy is ranked #1 by Google Scholar h5-index under 'Computer Security and Cryptography']
2021: A. Kumar, N. Saxena, and B. J. Choi, “Machine Learning Algorithm for Detection of False Data Injection Attack in Power System,” 35th International Conference on Information Networking (ICOIN), Jan. 12-15, 2021, Jeju, S. Korea. [Best Paper Award]
2020: M. N. Nafees, N. Saxena, R. Khan and P. Burnap, “Towards Distance Relay Attack Discrimination for Situational Awareness-Based Anomaly Detection,” 36th Annual Computer Security Applications Conference (ACSAC), 2020.
2020: M. N. Nafees, N. Saxena, P. Burnap and B. J. Choi, “Impact of Energy Consumption Attacks on LoRaWAN-Enabled Devices in Industrial Context,” 27th ACM Conference on Computer and Communications Security (ACM CCS), Nov. 9-13, 2020, pp. 2117-2119.
[ACM Symposium on Computer and Communications Security (CCS) is ranked #3 by Google Scholar h5-index under 'Computer Security and Cryptography']
2020: B. Asad and N. Saxena, “On the Feasibility of DoS Attack on Smart Door Lock IoT Network,” Eighth International Symposium on Security in Computing & Communications (SSCC), Oct. 14-17, 2020.
2020: B. Asad, N. Saxena and V. Katos, “Analysis of the Security and Privacy Risks and Challenges in Smart Cities’ Traffic Light System,” 3rd Smart Cities Symposium, Sept. 21-23, 2020, pp. 226-232, doi: 10.1049/icp.2021.0940.
2020: V. Singh, N. Saxena, D. Pathak, G. Saini, and D. Bhatnagar, “Improving Smart Healthcare Safety & Security Using Kinect,” International Conference on Cybersecurity in Emerging Digital Era (ICCEDE), Gr. Noida, India, Jul. 24-25, 2020.
2018: J. A. Stone, N. Saxena, and H. Dogan, “Systematic Analysis: Resistance to Traffic Analysis Attacksin Tor System for Critical Infrastructures,” IEEE International Conference on System, Man, and Cybernetics (SMC), Miyazaki, Japan, 7-10 Oct. 2018.
2018: N. Saxena, S. Grijalva, and B. J. Choi, “Securing Restricted Publisher-Subscriber Communications in Smart Grid Substations,” International Conference on COMmunication Systems and NETworkS (COMSNETS), Bengaluru, India, 3-7 Jan. 2018, pp. 364-371.
2017: N. Saxena, V. Katos, and N. Kumar, “Cyber-Physical Smart Grid Security Tool for Education and Training Purposes,” International Workshop on Realigning Cyber Security Education, Canberra, Australia, 27 Nov. 2017, pp. 1-6.
2017: N. Saxena, V. Chukwuka, L. Xiong, and S. Grijalva, “CPSA: A Cyber-Physical Security Assessment Tool for Situational Awareness in Smart Grid,” 3rd ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) in Conjunction with ACM CCS, Dallas, USA, 3 Nov. 2017, pp. 69-79.
2017: N. Saxena and N. S. Chaudhari, “Secure Algorithms for SAKA Protocol in the GSM Network,” 10th IFIP Wireless and Mobile Networking Conference (WMNC), Valencia, Spain, 25-27 Sep. 2017, pp. 1-8.
2017: N. Saxena, B. J. Choi, and S. Grijalva, "Secure and Privacy-Preserving Concentration of Meeting Data in AMI Networks," IEEE International Conference on Communications (ICC), Paris, France, 21-25 May, 2017, pp. 1-7. [IEEE ComSoc Young Professional and WICE Best Paper Award]
[IEEE International Conference on Communications is ranked #17 by Google Scholar h5-index under 'Computer Networks and Wireless Communication']
2015: N. Saxena and B. J. Choi, “A Hybrid Framework for Evaluating Intrusion Detection in the AMI Networks,” International Smart Grid Conference (ISGC), Gwangju, Korea, Oct. 12-14, 2015, pp. 551-555.
2015: N. Saxena, B. J. Choi, and S. Cho “Lightweight Privacy Preserving Authentication Scheme for V2G Networks in Smart Grid,” IEEE International Conference Trust, Security and Privacy in Computing and Communications (TrustCom), Helsinki, Finland, Aug. 20-22, 2015, pp. 604-611.
[IEEE TrustCom is ranked #20 by Google Scholar h5-index under 'Computer Security and Cryptography']
2015: N. Saxena and N. S. Chaudhari, “Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks,” 10th Annual Symposium on Information Assurance (ASIA), USA, Jun. 2-3 2015, pp. 67-72.
2014: N. Saxena and N. S. Chaudhari, “NS-AKA: An Improved and Efficient AKA Protocol for 3G (UMTS) Networks,” International Conference on Advances in Computer Science and Electronics Engineering (CSEE’14), Kuala Lumpur, Malaysia, Mar. 8-9, 2014, pp. 220-224. (Index: SEEK DL, DBLP, EI, Scopus, ISI proceedings)
2013: N. Saxena and N. S. Chaudhari, “First Symmetric Batch Verification Protocol for Securely Deliver Value Added Services to Multiple Mobile Users,” 29th Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, 9-13 December, 2013. (Index: ACM CIPS)
[Computer Security Applications Conference (ACSAC) is ranked #19 by Google Scholar h5-index under 'Computer Security and Cryptography']
2013: N. Saxena and N. S. Chaudhari, “An Integrated Approach for SMS Based Secure Mobile Banking in India,” 29th Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, 9-13 December, 2013. (Index: ACM CIPS) [Work-in-progress]
2013: N. Saxena and N. S. Chaudhari, “VAS-AKA: An Efficient Batch Verification Protocol for Value Added Services,” IEEE International Conference on System, Man, and Cybernetics (SMC’13), Manchester, UK, Oct. 13-16, 2013, pp. 1560-1565. (Rank-B conference; Index: ISI proceedings)
2013: N. Saxena, N. S. Chaudhari, and J. Thomas, “Solution to an Attack on Digital Signature in SMS Security,” 5th International Conference on Modeling, Simulation and Applied Optimization (ICMSAO’13), Hammamet, Tunisia, Apr. 28-30, 2013, pp. 1-6. (Acceptance Ratio 48%; Index: ISI proceedings)
2013: N. Saxena and N. S. Chaudhari, “NPA: Protocol for Secure Communications in GSM Cellular Network,” in the proceedings of The 10th Annual IEEE Consumer Communications & Networking Conference (CCNC’13), Wireless Communication Track, Las Vagas, Navada USA, Jan. 11-14, 2013, pp. 408-413. (Rank-B conference)
2012: N. Saxena and N. S. Chaudhari, “Secure Encryption with Digital Signature Approach for Short Message Service,” 2012 World Congress on Information and Communication Technologies (WICT’12), Trivandrum, India, ISBN: 978-1-4673-4804-1, Oct. 30-Nov. 2, 2012, pp. 803-806. (Index: ISI proceedings)
2012: N. Saxena and N. S. Chaudhari, “A Secure Approach for SMS in GSM Network,” ACM CUBE International IT Conference & Exhibition (CUBE’12), Pune, India, ISBN: 978-1-4503-1185-4, Sep. 3-5, 2012, pp. 59-64. (Index: ACM DL, DBLP, EI; Acceptance Ratio: 32.8%, 147/449)
2012: N. Saxena, N. S. Chaudhari, and G. L. Prajapati, “An Extended Approach for SMS Security using Authentication Functions,” 7th IEEE International Conference on Industrial Electronics and Applications (ICIEA’12), Singapore, ISBN: 978-1-4577-2119, Jul. 18-20, 2012, pp. 663-668. (ICIEA has been ranked - ‘A’ by the Excellence in Research for Australia; Index: ISI proceedings)
2012: N. Saxena and N. S. Chaudhari, “Analysis of El-Gamal with Diffie-Hellman Scheme using Hash-Function for Message Security,” 2012 IEEE International Students Conference on Engineering and Systems (SCES 2012), MNNIT Allahabad, India, ISBN: 978-1-4673-0454-2, Mar. 16-18, 2012, pp. 55-60.
2012: N. Saxena and N. S. Chaudhari, “Message Security in Wireless Networks: Infrastructure based vs. Infrastructureless Networks,” 2012 IEEE International Students Conference on Engineering and Systems (SCES 2012), MNNIT Allahabad, India, ISBN: 978-1-4673-0454-2, Mar. 16-18, 2012, pp. 915-920.
2010: N. Saxena, K. K. Saxena, S. Saxena, and S. Saxena, “Fuzzy Logic Performance Analysis Model for Students,” International Conference on Operations and Management Sciences (ICOMS’10), IMT Nagpur, India, ISBN: 978-93-800-43-79-1, Excel India Publishers New Delhi, Feb. 12-13, 2010, pp. 490-506.
2009: N. Saxena, K. K. Saxena, and S. Saxena, “Fuzzy Logic Based Decision Making System for Replacement Model,” in the proceedings of International Conference on Operations Research Applications in Engineering and Management, Anna University, Tiruchirappalli, India, May 27-29, 2009.
2010: N. Saxena, K. K. Saxena, P. Goel, and A. Srivastava, “Comparative Study of Symmetric vs. Asymmetric Keys Encryption/Decryption Techniques for Secure Communication,” National Conference on Future Trends in Information & Communication Technology, RKGIT Ghaziabad, India, 13 February, 2010, pp. 62-67.
2009: N. Saxena and K. K. Saxena, “Comparative Study of Symmetric Key Cryptographic Algorithms: DES, Triple DES and AES,” National Conference Next Generation Technologies for Information Management (NGTIM-2009), ITS – Management and IT Institute Ghaziabad, India, ISBN: 978-81-89547-69-1, Wisdom Publication Delhi, 7 November, 2009, pp. 255-265.
2009: N. Saxena, K. K. Saxena, and S. Saxena, “Security Based Cryptography Schemes for Password Based Protocols,” National Conference Recent Trends in Network Security and Cryptography, PES College of Engineering Bangalore, India, 22-23 October, 2009, pp. 173-176.
2009: N. Saxena, K. K. Saxena, and S. Saxena, “Data Warehouse: Multidimensional University Database for Result-Analysis,” National Conference Network, Intelligence and Computing Systems, SNS College of Technology Coimbatore, India, 16 February, 2009.
2009: N. Saxena, K. K. Saxena, and S. Saxena, “Comparative Analysis of Transmission Protocols for Ad-hoc Networks,” National Conference Future Trends in Applications of Computers in Science & Technology, IMS Engineering College Ghaziabad, India, 7-8 February, 2009, pp. 74-81.
2009: S. Saxena, K. K. Saxena, and N. Saxena, “Multidimensional Database for Book Sales Data Warehouse,” National conference Advance Computing and Communication Technology, ABES Engineering College Ghaziabad, India, 6-7 February, 2009, pp. E 22-25.