Indian Institute of Technology Roorkee, India || Canadian Institute for Cybersecurity, Canada
Securing Financial Sector Applications in the Quantum Era: A Comprehensive Evaluation of Nist's Recommended Algorithms Through Use-Case Analysis. Expert Systems with Applications Journal, 2025, https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4836780. (Accepted)
Assessing the Quantum Readiness of Cryptographic Standards: From Survey to Secure Recommendations (2025), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5256004. (Under Review)
Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration. Journal of Grid Computing, vol. 21(3), 2023, Doi.org/10.1007/s10723-023-09672-z. (SCIE, INSPEC, Scopus, ACM Digital Library, DBLP)(IF= 4.674)
dualDup: A Secure and Reliable Cloud Storage Framework to Deduplicate the Encrypted Data and Key. Journal of Information Security and Applications, vol. 69, pp. 103265, 2022, https://doi.org/10.1016/j.jisa.2022.103265. (SCIE, INSPEC, Scopus)(IF= 4.960)
Evaluation Framework for Quantum Security Risk Assessment: A Comprehensive Study for Quantum-Safe Migration. Computers & Security Journal, 2024, https://doi.org/10.48550/arXiv.2404.08231 (https://doi.org/10.2139/ssrn.4750609). (Under Review)
Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols. Computers & Security Journal, vol. 142, 2024, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2024.103883 (https://arxiv.org/abs/2404.08232) (https://www.sciencedirect.com/science/article/pii/S0167404824001846). (SCIE, INSPEC, Scopus)(IF= 5.6)
Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure. Cryptography and Security (cs.CR), 2024, https://arxiv.org/abs/2404.08231. (Under Review)
Do-It-Yourself Recommender System: Reusing and Recycling with Blockchain and Deep Learning. IEEE Access, vol. 10, pp. 90056-90067, 2022, DOI:10.1109/ACCESS.2022.3199661. (SCIE, JCR, Scopus, DOAJ, Web of Science)(IF=3.476)
Blockchain-based Secure and Transparent Election and Vote Counting Mechanism using Secret Sharing Scheme. Journal of Ambient Intelligence and Humanized Computing, 2022, doi:10.1007/s12652-022-04108-0. (SCIE, JCR, Scopus, DBLP, ACM)(IF=7.104)
Comminution characters of fault zone rocks and secure outcomes in the Blockchain record-keeping system for industrial applications. Journal of Scientific and Industrial Research (JSIR), vol. 81(7), pp. 767-775, 2022, http://nopr.niscpr.res.in/handle/123456789/60054. (SCIE) (IF= 1.056)
Fair Trading of Crops in a Trusted and Transparent Manner using Smart Contracts. In: Patgiri, R., Bandyopadhyay, S., Borah, M.D., Emilia Balas, V. (eds) Edge Analytics: Proceedings of 26th annual International Conference on Advanced Computing and Communications (ADCOM). Lecture Notes in Electrical Engineering, vol 869, pp. 697–709, 2022. Springer, Singapore. https://doi.org/10.1007/978-981-19-0019-8_52.
Reliable Verification of Distributed Encoded Data Fragments in the Cloud. Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 9127–9143, 2021, doi:10.1007/s12652-020-02610-x. (SCIE, JCR, Scopus, DBLP, ACM)(IF=7.104)
Trusted and transparent Blockchain-enabled E-waste optimization to recover precious metals with Microwave heating. Journal of Scientific and Industrial Research, vol. 80(7), pp. 623-629, 2021, http://nopr.niscpr.res.in/handle/123456789/57970. (SCIE) (IF= 1.056)
Real-Time Safety and Surveillance System Using Facial Recognition Mechanism. In: Dash, S.S., Das, S., Panigrahi, B.K. (eds) Intelligent Computing and Applications. Advances in Intelligent Systems and Computing, vol 1172, pp. 497–506,2021. Springer, Singapore. https://doi.org/10.1007/978-981-15-5566-4_44
Investigation of Optimal Data Encoding Parameters Based on User Preference for Cloud Storage. IEEE Access, vol. 8, pp. 75105-75118, 2020, doi:10.1109/ACCESS.2020.2987999. (SCIE, JCR, Scopus, DOAJ, Web of Science)(IF=4.640)
NDTAEP: Design of a novel deadline-aware task scheduling model using augmented ensemble pattern analysis. Journal of Statistics and Management Systems, vol. 26(6), pp. 1377–1389, 2023, https://doi.org/10.47974/JSMS-1078.
Hybrid Android Malware Detection by Combining Supervised and Unsupervised Learning, in 24th Annual International Conference on Mobile Computing and Networking (MobiCom), New Delhi, India, 29 October -2 November, 2018, ACM. https://doi.org/10.1145/3241539.3267768
IoT-Enabled monitoring system for Plant Health Growth with the authors, in International Conference on Innovations in Artificial Intelligence and Applications (InnovAI2023), Dubai, UAE, 21-22 December 2023, IEEE. https://doi.org/10.1145/3241539.3267768
Hierarchical Storage Technique for Maintaining Hop-Count to Prevent DDoS Attack in Cloud Computing. In: Kumar M., A., R., S., Kumar, T. (eds) Proceedings of International Conference on Advances in Computing. Advances in Intelligent Systems and Computing, vol 174, pp. 511–518, 2013. Springer, New Delhi. https://doi.org/10.1007/978-81-322-0740-5_62
Packet Monitoring Approach to Prevent DDoS Attack in Cloud Computing, in International Journal of Computer Science and Electrical Engineering (IJCSEE) Proceedings of International Conference on Cloud Computing, Bangalore, India, 29 January 2012, pp. 38-42.