default search action
Chandrashekhar Meshram
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Chandrashekhar Meshram, Mohammad S. Obaidat, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, Arpit Vijay Raikwar:
An efficient privacy-preserved authentication technique based on conformable fractional chaotic map for TMIS under smart homes environments. J. Supercomput. 80(2): 2514-2537 (2024) - [c13]Chandrashekhar Meshram, Mohammad S. Obaidat, Balqies Sadoun, Agbotiname Lucky Imoize:
An Efficient Provably Secure Identity-Based Authentication Technique for TMIS Under a Smart City Environment. CCCI 2024: 1-7 - [c12]Chandrashekhar Meshram, Mohammad S. Obaidat, Balqies Sadoun, Agbotiname Lucky Imoize, Vishesh P. Gaikwad:
A Robust Subtree-Based Authentication Scheme for TMIS Using Chaotic Hash Function. CITS 2024: 1-7 - 2023
- [j40]Preecha Yupapin, Chandrashekhar Meshram, Sharad Kumar Barve, Rabha W. Ibrahim, Muhammad Azeem Akbar:
An efficient provably secure verifier-based authentication protocol using fractional chaotic maps in telecare medicine information systems. Soft Comput. 27(10): 6033-6047 (2023) - [j39]Sarita Gajbhiye Meshram, Mohd Abul Hasan, Atefeh Nouraki, Mohammad Alavi, Mohammad Albaji, Chandrashekhar Meshram:
Machine learning prediction of sediment yield index. Soft Comput. 27(21): 16111-16124 (2023) - [j38]Chandrashekhar Meshram, Rabha W. Ibrahim, Preecha Yupapin, Ismail Bahkali, Agbotiname Lucky Imoize, Sarita Gajbhiye Meshram:
An efficient certificateless group signcryption scheme using Quantum Chebyshev Chaotic Maps in HC-IoT environments. J. Supercomput. 79(15): 16914-16939 (2023) - [c11]Mohammad S. Obaidat, Chandrashekhar Meshram, Deepak Kartikey, Kuei-Fang Hsiao, Agbotiname Lucky Imoize, Sharad Kumar Barve:
A Robust Remote Client Password Authentication Technique for Smart Cities E-Governance Applications. CCCI 2023: 1-6 - [c10]Chandrashekhar Meshram, Mohammad S. Obaidat, Balqies Sadoun, Parkash Tambare, Agbotiname Lucky Imoize:
An Efficient Anonymous Authentication Technique for TMIS under the Smart Home Environment. CITS 2023: 1-6 - 2022
- [j37]Chandrashekhar Meshram, Agbotiname Lucky Imoize, Sajjad Shaukat Jamal, Adel R. Alharbi, Sarita Gajbhiye Meshram, Iqtadar Hussain:
CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique Based on Fractional Chaotic Maps. IEEE Access 10: 39853-39863 (2022) - [j36]Chandrashekhar Meshram, Rabha W. Ibrahim, Rafida M. Elobaid:
An Efficient Conformable Fractional Chaotic Map-Based Online/Offline IBSS Scheme for Provable Security in ROM. Complex. 2022: 6302328:1-6302328:11 (2022) - [j35]Muhammad Azeem Akbar, Sajjad Mahmood, Chandrashekhar Meshram, Ahmed Alsanad, Abdu Gumaei, Salman A. AlQahtani:
Barriers of managing cloud outsource software development projects: a multivocal study. Multim. Tools Appl. 81(25): 35571-35594 (2022) - [j34]Parkash Tambare, Chandrashekhar Meshram, Cheng-Chi Lee, Rakesh Jagdish Ramteke, Agbotiname Lucky Imoize:
Performance Measurement System and Quality Management in Data-Driven Industry 4.0: A Review. Sensors 22(1): 224 (2022) - [j33]Sarita Gajbhiye Meshram, Chandrashekhar Meshram, Fateme Akhoni Pourhosseini, Mohd Abul Hasan, Saiful Islam:
A Multi-Layer Perceptron (MLP)-Fire Fly Algorithm (FFA)-based model for sediment prediction. Soft Comput. 26(2): 911-920 (2022) - [j32]Chandrashekhar Meshram, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, Sajjad Shaukat Jamal, Agbotiname Lucky Imoize:
An efficient authentication with key agreement procedure using Mittag-Leffler-Chebyshev summation chaotic map under the multi-server architecture. J. Supercomput. 78(4): 4938-4959 (2022) - [j31]Chandrashekhar Meshram, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, Agbotiname Lucky Imoize, Sajjad Shaukat Jamal, Sharad Kumar Barve:
An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric. J. Supercomput. 78(10): 12792-12814 (2022) - [c9]Chandrashekhar Meshram, Mohammad S. Obaidat, Agbotiname Lucky Imoize, Ismail Bahkali, Akshaykumar Meshram, Kuei-Fang Hsiao:
An Efficient Digital Short Signature Scheme using CCM for HC-IoT Environments. CCCI 2022: 1-6 - [c8]Chandrashekhar Meshram, Mohammad S. Obaidat, Agbotiname Lucky Imoize, Ismail Bahkali, Parkash Tambare, Kuei-Fang Hsiao:
An Efficient Authentication Technique using Convolution Chebyshev Chaotic Maps for TMIS. CCCI 2022: 1-6 - 2021
- [j30]Chandrashekhar Meshram, Ahmed Alsanad, Jitendra V. Tembhurne, Shailendra W. Shende, Kailash Wamanrao Kalare, Sarita Gajbhiye Meshram, Muhammad Azeem Akbar, Abdu Gumaei:
A Provably Secure Lightweight Subtree-Based Short Signature Scheme With Fuzzy User Data Sharing for Human-Centered IoT. IEEE Access 9: 3649-3659 (2021) - [j29]Vishesh P. Gaikwad, Jitendra V. Tembhurne, Chandrashekhar Meshram, Cheng-Chi Lee, Chun-Ta Li:
An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS. IEEE Access 9: 108586-108600 (2021) - [j28]Chandrashekhar Meshram, Agbotiname Lucky Imoize, Azeddine Elhassouny, Amer Aljaedi, Adel R. Alharbi, Sajjad Shaukat Jamal:
IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks. IEEE Access 9: 131336-131347 (2021) - [j27]Chandrashekhar Meshram, Agbotiname Lucky Imoize, Amer Aljaedi, Adel R. Alharbi, Sajjad Shaukat Jamal, Sharad Kumar Barve:
An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps. Sensors 21(21): 7039 (2021) - [j26]Chandrashekhar Meshram, Agbotiname Lucky Imoize, Amer Aljaedi, Adel R. Alharbi, Sajjad Shaukat Jamal, Sharad Kumar Barve:
A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments. Sensors 21(21): 7227 (2021) - [j25]Chandrashekhar Meshram, Mohammad S. Obaidat, Cheng-Chi Lee, Sarita Gajbhiye Meshram:
An Efficient, Robust, and Lightweight Subtree-Based Three-Factor Authentication Procedure for Large-Scale DWSN in Random Oracle. IEEE Syst. J. 15(4): 4927-4938 (2021) - [j24]Chandrashekhar Meshram, Mohammad S. Obaidat, Jitendra V. Tembhurne, Shailendra W. Shende, Kailash W. Kalare, Sarita Gajbhiye Meshram:
A Lightweight Provably Secure Digital Short-Signature Technique Using Extended Chaotic Maps for Human-Centered IoT Systems. IEEE Syst. J. 15(4): 5507-5515 (2021) - [j23]Chandrashekhar Meshram, Rabha W. Ibrahim, Mohammad S. Obaidat, Balqies Sadoun, Sarita Gajbhiye Meshram, Jitendra V. Tembhurne:
An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps. Soft Comput. 25(14): 8905-8920 (2021) - [j22]Chandrashekhar Meshram, Rabha W. Ibrahim, Lunzhi Deng, Shailendra W. Shende, Sarita Gajbhiye Meshram, Sharad Kumar Barve:
A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment. Soft Comput. 25(15): 10037-10051 (2021) - [j21]Sarita Gajbhiye Meshram, Hamid Reza Pourghasemi, Sani Isah Abba, Ehsan Alvandi, Chandrashekhar Meshram, Khaled Mohamed Khedher:
A comparative study between dynamic and soft computing models for sediment forecasting. Soft Comput. 25(16): 11005-11017 (2021) - [j20]Vishesh P. Gaikwad, Jitendra V. Tembhurne, Chandrashekhar Meshram, Cheng-Chi Lee:
Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function. J. Supercomput. 77(8): 8281-8304 (2021) - [c7]Chandrashekhar Meshram, Mohammad S. Obaidat, Kuei-Fang Hsiao, Agbotiname Lucky Imoize, Akshaykumar Meshram:
An Effective Fair Off-Line Electronic Cash Protocol using Extended Chaotic Maps with Anonymity Revoking Trustee. CCCI 2021: 1-5 - 2020
- [j19]Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Akshaykumar Meshram:
OOS-SSS: An Efficient Online/Offline Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor Network. IEEE Access 8: 80063-80073 (2020) - [j18]Muhammad Azeem Akbar, Hussain Alsalman, Arif Ali Khan, Sajjad Mahmood, Chandrashekhar Meshram, Abdu Gumaei, Muhammad Tanveer Riaz:
Multicriteria Decision Making Taxonomy of Cloud-Based Global Software Development Motivators. IEEE Access 8: 185290-185310 (2020) - [j17]Chandrashekhar Meshram, Cheng-Chi Lee, Abhay S. Ranadive, Chun-Ta Li, Sarita Gajbhiye Meshram, Jitendra V. Tembhurne:
A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing. Int. J. Commun. Syst. 33(7) (2020) - [j16]Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Rakesh Jagdish Ramteke, Akshaykumar Meshram:
An Efficient Mobile-Healthcare Emergency Framework. J. Medical Syst. 44(3): 58 (2020) - [j15]Chandrashekhar Meshram, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, Kailash Wamanrao Kalare, Sunil D. Bagde:
An efficient ID-based cryptographic technique using IFP and GDLP. Secur. Priv. 3(5) (2020) - [j14]Chandrashekhar Meshram, Mohammad S. Obaidat, Cheng-Chi Lee, Sarita Gajbhiye Meshram:
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem. Soft Comput. 24(9): 6531-6537 (2020) - [c6]Kailash W. Kalare, Mohammad S. Obaidat, Jitendra V. Tembhurne, Chandrashekhar Meshram, Kuei-Fang Hsiao:
Parallelization of Global Sequence Alignment on Graphics Processing Unit. CCCI 2020: 1-5 - [c5]Chandrashekhar Meshram, Mohammad S. Obaidat, Akshaykumar Meshram:
New Efficient QERPKC based on Partial Discrete Logarithm Problem. CITS 2020: 1-5 - [c4]Chandrashekhar Meshram, Mohammad S. Obaidat, Akshaykumar Meshram:
An Efficient Robust Lightweight Remote User Authentication Protocol using Extended Chaotic Maps. CITS 2020: 1-6
2010 – 2019
- 2019
- [j13]Chandrashekhar Meshram, Chun-Ta Li, Sarita Gajbhiye Meshram:
An efficient online/offline ID-based short signature procedure using extended chaotic maps. Soft Comput. 23(3): 747-753 (2019) - [j12]Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Chun-Ta Li:
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput. 23(16): 6937-6946 (2019) - [j11]Sarita Gajbhiye Meshram, Mohmmmad Ali Ghorbani, Shahaboddin Shamshirband, Vahid Karimi, Chandrashekhar Meshram:
River flow prediction using hybrid PSOGSA algorithm based on feed-forward neural network. Soft Comput. 23(20): 10429-10438 (2019) - [j10]Chandrashekhar Meshram, Cheng-Chi Lee, Sarita Gajbhiye Meshram, Muhammad Khurram Khan:
An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. Soft Comput. 23(24): 13127-13138 (2019) - [j9]Sarita Gajbhiye Meshram, Ehsan Alvandi, Vijay P. Singh, Chandrashekhar Meshram:
Comparison of AHP and fuzzy AHP models for prioritization of watersheds. Soft Comput. 23(24): 13615-13625 (2019) - [c3]Chandrashekhar Meshram, Mohammad S. Obaidat, Kuei-Fang Hsiao:
An Efficient EUF-ID-CMA Secure Identity-based Short Signature Scheme using Discrete Logarithm. CITS 2019: 1-5 - 2018
- [j8]Chandrashekhar Meshram, Pournima L. Powar, Mohammad S. Obaidat, Cheng-Chi Lee, Sarita Gajbhiye Meshram:
Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs. IET Networks 7(6): 363-367 (2018) - [j7]Chandrashekhar Meshram, Sarita Gajbhiye Meshram, Cheng-Chi Lee:
Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle. Int. J. Netw. Secur. 20(3): 568-574 (2018) - [j6]Chandrashekhar Meshram, Mohammad S. Obaidat, Sarita Gajbhiye Meshram:
Chebyshev chaotic map-based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography. Secur. Priv. 1(1) (2018) - 2017
- [j5]Chandrashekhar Meshram, Yuh-Min Tseng, Cheng-Chi Lee, Sarita Gajbhiye Meshram:
An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP. Informatica 28(3): 471-484 (2017) - [j4]Chandrashekhar Meshram, Cheng-Chi Lee, Chun-Ta Li, Chin-Ling Chen:
A secure key authentication scheme for cryptosystems based on GDLP and IFP. Soft Comput. 21(24): 7285-7291 (2017) - 2015
- [j3]Chandrashekhar Meshram:
An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem. Inf. Process. Lett. 115(2): 351-358 (2015) - [c2]Chandrashekhar Meshram, Mohammad S. Obaidat:
An ID-based Quadratic-Exponentiation Randomized Cryptographic scheme. CITS 2015: 1-5 - 2013
- [j2]Chandrashekhar Meshram, Suchitra A. Meshram:
An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem. Inf. Process. Lett. 113(10-11): 375-380 (2013) - 2012
- [j1]Chandrashekhar Meshram, Suchitra A. Meshram, Mingwu Zhang:
An ID-based cryptographic mechanisms based on GDLP and IFP. Inf. Process. Lett. 112(19): 753-758 (2012) - 2011
- [c1]Chandrashekhar Meshram, Suchitra A. Meshram:
An identity based beta cryptosystem. IAS 2011: 298-303
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint