Institution
Thapar University
Education•Patiāla, Punjab, India•
About: Thapar University is a education organization based out in Patiāla, Punjab, India. It is known for research contribution in the topics: Computer science & Cloud computing. The organization has 2944 authors who have published 8558 publications receiving 130392 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this article, the structural, physical, thermal, optical, mechanical and conducting properties of glass and glass ceramic samples were studied using X-ray diffraction (XRD), Differential Thermal Analyzer (DTA), Fourier Transform Infrared spectroscopy (FTIR), UV-visible spectrograph, and Impedance spectrograms.
83 citations
••
TL;DR: Findings of the study revealed that perceived risk had a negative relation with customer satisfaction where as the website functionality and drivers were positively associated withCustomer satisfaction.
Abstract: The study analyzed website functionality, perceived risk and drivers of online shopping to evaluate their impact on customer satisfaction in India. The study empirically validates ease of ordering, Cash-on-delivery mode of payment, website functionality and different facets of perceived risk with Unified theory of acceptance and use of technology 2 (UTAUT2) (Venkatesh et al. in MIS Q 36(1):157–178, 2012). Findings of the study revealed that perceived risk had a negative relation with customer satisfaction where as the website functionality and drivers were positively associated with customer satisfaction. The research will help online retailers to recognize the important success factors that instill confidence among the consumers in developing economies. The study will also help online retailers to focus in the right direction to eliminate threats and convert non shoppers to online shoppers. The study throws light on a new aspect to research by validating the role of cash-on-delivery (COD) mode of payment as a construct and ease of ordering as new dimension to UTAUT2.
83 citations
••
TL;DR: This paper proposes a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes and shows strong security properties that are provided from the proposed authentication scheme.
Abstract: The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.
83 citations
••
TL;DR: A lightweight authentication protocol in a suitable communication model for VANET that meets the privacy protection needs, with only hash functions and exclusive-OR operations is put forward, which is robust enough to get rid of common attacks and keep the communication data secretly.
Abstract: With the emergence of the concept of smart city and the increase of vehicles, the vehicular ad-hoc network (VANET) is widely accepted for the communication of vehicles to get information including road condition, traffic congestion description, speed, and location of vehicles. Naturally, the security of the data transmission in VANET has become one of the urgent tasks of researchers. Many privacy-preserving authentication protocols for VANETs have been presented. However, heavy computations and security flaws exist in them. Thus, we put forward a lightweight authentication protocol in a suitable communication model for VANET that meets the privacy protection needs, with only hash functions and exclusive-OR operations. Formal security analysis using BAN logic shows that our protocol achieves the security goals. Proverif is used to verify the security of the protocol and the results show that the privacy can be guaranteed under the simulated attacker. Moreover, through security properties analysis, our protocol is robust enough to get rid of common attacks and keep the communication data secretly. The performance comparison results show that our protocol is lightweight and efficient. Furthermore, we simulate the network with SUMO and NS-3, and all show that our protocol is efficient and practical for VANETs.
83 citations
••
TL;DR: In this article, a review elucidates the photocatalytic nature of carbon materials such as graphene, graphene oxide, carbon nanotubes, graphitic carbon nitride, and fullerenes as they have the tendency to narrow the band gap, allocate electrons, and act as semiconductors, co-catalysts, photosensitizers and support materials.
83 citations
Authors
Showing all 3035 results
Name | H-index | Papers | Citations |
---|---|---|---|
Gaurav Sharma | 82 | 1244 | 31482 |
Vinod Kumar | 77 | 815 | 26882 |
Neeraj Kumar | 76 | 587 | 18575 |
Ashish Sharma | 75 | 909 | 20460 |
Dinesh Kumar | 69 | 1333 | 24342 |
Pawan Kumar | 64 | 547 | 15708 |
Harish Garg | 61 | 311 | 11491 |
Rafat Siddique | 58 | 183 | 11133 |
Surya Prakash Singh | 55 | 736 | 12989 |
Abhijit Mukherjee | 55 | 378 | 10196 |
Ajay Kumar | 53 | 809 | 12181 |
Soumen Basu | 45 | 247 | 7888 |
Sudeep Tanwar | 43 | 263 | 5402 |
Yosi Shacham-Diamand | 42 | 287 | 6463 |
Rupinder Singh | 42 | 458 | 7452 |