Follow
Pritam Gajkumar Shah
Pritam Gajkumar Shah
Chief Editor Australian Journal of Wireless Technologies, Mobility and Security
Verified email at ausjournal.com - Homepage
Title
Cited by
Cited by
Year
Internet of Things architecture and applications: a survey
T Ara, PG Shah, M Prabhakar
Indian Journal of Science and Technology, 2016
342016
Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange
X Huang, PG Shah, D Sharma
2010 Fourth International Conference on Network and System Security, 588-593, 2010
332010
Analytical study of implementation issues of Elliptical Curve Cryptography for Wireless Sensor networks
PG Shah, X Huang, D Sharma
2010 IEEE 24th International Conference on Advanced Information Networking …, 2010
312010
Multi-agent system protecting from attacking with elliptic curve cryptography
X Huang, PG Shah, D Sharma
Advances in Intelligent Decision Technologies: Proceedings of the Second KES …, 2010
252010
Revisting of elliptical curve cryptography for securing Internet of Things (IOT)
DP Shah, PG Shah
2018 Advances in Science and Engineering Technology International …, 2018
242018
Security with IP address assignment and spoofing for smart IOT devices
S Rajashree, KS Soman, PG Shah
2018 international conference on advances in computing, communications and …, 2018
212018
Fast algorithm in ECC for wireless sensor network
X Huang, P Shah, D Sharma
Proceedings of the International MultiConference of Engineers and Computer …, 2010
202010
IoT and block chain driven intelligent transportation system
P Manjunath, R Soman, PG Shah
2018 Second International Conference on Green Computing and Internet of …, 2018
172018
Advances in intelligent decision technologies: Proceedings of the Second KES International Symposium IDT 2010
G Phillips-Wren
Springer Science & Business Media, 2010
172010
Algorithm based on one's complement for fast scalar multiplication in ECC for wireless sensor network
PG Shah, X Huang, D Sharma
2010 IEEE 24th International Conference on Advanced Information Networking …, 2010
162010
Dynamic key dependent S-Box for symmetric encryption for IoT devices
T Ara, PG Shah, M Prabhakar
2018 Second International Conference on Advances in Electronics, Computers …, 2018
152018
Minimizing hamming weight based on 1's complement of binary numbers over GF(2m)
X Huang, PG Shah, D Sharma
2010 The 12th International Conference on Advanced Communication Technology …, 2010
152010
Sliding window method with flexible window size for scalar multiplication on wireless sensor network nodes.
PG Shah, X Huang, D Sharma
2010 International Conference on Wireless Communication and Sensor Computing …, 2010
152010
Fast scalar multiplication for elliptic curve cryptography in sensor networks with hidden generator point
X Huang, PG Shah, D Sharma
2010 International Conference on Cyber-Enabled Distributed Computing and …, 2010
132010
IoT based food wastage management system
P Manjunath, PG Shah
2019 Third international conference on I-SMAC (IoT in social, mobile …, 2019
102019
Energy efficient secured cluster based distributed fault diagnosis protocol for IoT
T Ara, M Prabhkar, PG Shah
International Journal of Communication Networks and Information Security 10 …, 2018
72018
IoT driven with big data analytics and block chain application scenarios
P Manjunath, MK Prakruthi, PG Shah
2018 Second International Conference on Green Computing and Internet of …, 2018
72018
Investigating effects of co-ordinate system on execution time of elliptical curve protocol in wireless sensor networks
PG Shah
2012 International Conference on Future Communication Networks, 153-158, 2012
72012
Security model for internet of things end devices
S Rajashree, PG Shah, S Murali
2018 IEEE international conference on internet of things (iThings) and IEEE …, 2018
62018
A survey of security challenges in internet of things (iot) integration with wsn
PG Shah, J Ambareen
Australian Journal of Wireless Technologies, Mobility & Security, 2014
52014
The system can't perform the operation now. Try again later.
Articles 1–20