User profiles for Vinod Kumar Mahor

Vinod Mahor

Computer Science & Engineering
Verified email at iesbpl.ac.in
Cited by 1246

Three factor chaotic map based efficient authentication scheme for smart healthcare systems

VK Mahor, R Padmavathy… - 2023 7th International …, 2023 - ieeexplore.ieee.org
Adoption of IoT in healthcare is called Internet of Medical Things(IoMT). IoMT along with device
intelligence are helping to realize the concept of smart healthcare. IoMT contains several …

Chebyshev chaotic map-based efficient authentication scheme for secure access of VoIP services through SIP

VK Mahor, R Padmavathy… - International Journal of …, 2022 - inderscienceonline.com
In a network of participants who wish to communicate or access multimedia service using
voice over IP (VoIP), session initiation protocol (SIP) is used. SIP exists in the application layer …

A secure three factor-based fully anonymous user authentication protocol for multi-server environment

…, SK Dewangan, M Kumar - … Journal of Ad Hoc …, 2020 - inderscienceonline.com
A single sign-on authentication scheme is required protocol in multi-server environment.
Recently, an authentication protocol based on Lagrange interpolation polynomial to satisfy multi…

Secure and lightweight authentication protocol for anonymous data access in cloud assisted iot system

V Mahor, R Padmavathy, S Chatterjee - Peer-to-Peer Networking and …, 2024 - Springer
Rapid evolution of IoT technologies has virtually made connectivity of all the real world objects
to the internet possible with the help of tiny embedded devices also known as IoT devices…

[PDF][PDF] A Review: Wormhole Attack and Wireless Sensor Networks

HS Anjana, V Mahor - 2023 - academia.edu
Wormhole attacks are a type of security threat where an attacker captures packets at one
location in a network and tunnels them to another location to retransmit them, bypassing …

An efficient fine grained access control scheme based on attributes for enterprise class applications

S Chatterjee, AK Gupta, VK Mahor… - … Conference on Signal …, 2014 - ieeexplore.ieee.org
Fine-grained access control is used to assign unique access privilege to a particular user
for accessing any particular enterprise class application for which he/she is authorized. The …

Cyber threat phylogeny assessment and vulnerabilities representation at thermal power station

V Mahor, B Garg, S Telang, K Pachlasiya… - … Conference on Network …, 2021 - Springer
Cyber security issues relating to thermal power stations (TPS) are the major focus of concern
towards the development of digital computing equipment. Stuxnet, the computer virus that …

[PDF][PDF] Security framework for heterogeneous IoT application environment

VK Mahor, S Satnami, T Sarmah - ijltes.com
Internet of Things (IoT) enables the real-world objects to interconnect with the help of internet
and exchange the data and commands. The adaptation space of IoT is rapidly increasing …

Dark Web for the Spread of Illegal Activities Using Tor

V Mahor, S Bijrothiya, RK Bhujade… - Dark Web Pattern …, 2022 - igi-global.com
The dark web has been in existence since about the emergence of the internet. There is still
a wealth of material indexed on the web that is freely available to anyone with internet …

E‐Healthcare Systems Based on Blockchain Technology with Privacy

V Mahor, S Bijrothiya - Robotic Process Automation, 2023 - Wiley Online Library
Healthcare challenges include sluggish access to medical data, poor system interoperability,
lack of patient agency, and data quality and quantity for medical research that can be …