2022 - Research.com Computer Science in India Leader Award
Computer network, Computer security, Authentication, The Internet and Distributed computing are his primary areas of study. His Computer network research is multidisciplinary, incorporating elements of Energy consumption and Smart grid. His research in Smart grid tackles topics such as Smart city which are related to areas like Smart system.
As part of one scientific family, Neeraj Kumar deals mainly with the area of Computer security, narrowing it down to issues related to the Wireless, and often Mobile device and Password cracking. His study in Authentication is interdisciplinary in nature, drawing from both Elliptic curve cryptography, Password, Internet security and Smart card. His Distributed computing research incorporates elements of Learning automata, Network congestion, Edge device, Edge computing and Big data.
His primary scientific interests are in Computer network, Computer security, Distributed computing, The Internet and Authentication. His Computer network study combines topics from a wide range of disciplines, such as Dissemination and Wireless ad hoc network, Vehicular ad hoc network. His studies deal with areas such as Learning automata, Scalability, Quality of service, Smart grid and Efficient energy use as well as Distributed computing.
The Smart grid study combines topics in areas such as Demand response and Energy management. The various areas that Neeraj Kumar examines in his Authentication study include Password, Internet security and Elliptic curve cryptography. He has researched Wireless sensor network in several fields, including Key distribution in wireless sensor networks and Base station.
His main research concerns Computer security, Blockchain, Computer network, Artificial intelligence and The Internet. His Computer security study frequently involves adjacent topics like Protocol. Neeraj Kumar interconnects Scalability, Smart grid, Internet privacy and Traceability in the investigation of issues within Blockchain.
His study looks at the relationship between Smart grid and topics such as Distributed computing, which overlap with Scheduling. His Computer network study often links to related topics such as Wireless. His work in Authentication addresses subjects such as Security analysis, which are connected to disciplines such as Internet security.
Neeraj Kumar mainly focuses on Computer security, Blockchain, Authentication, The Internet and Smart grid. In the subject of general Computer security, his work in Key is often linked to Software deployment, thereby combining diverse domains of study. He has included themes like Security analysis and Internet security in his Authentication study.
His The Internet research integrates issues from Deep learning, Artificial intelligence, Data management and Drone. His Smart grid research includes themes of Load management, Risk analysis, Demand response and Renewable energy. His work deals with themes such as Energy consumption, Edge computing and Computer network, which intersect with Data migration.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Review: A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks
Sudhanshu Tyagi;Neeraj Kumar.
Journal of Network and Computer Applications (2013)
Anonymous Authentication for Wireless Body Area Networks With Provable Security
Debiao He;Sherali Zeadally;Neeraj Kumar;Jong-Hyouk Lee.
IEEE Systems Journal (2017)
A systematic review on routing protocols for Vehicular Ad Hoc Networks
Amit Dua;Neeraj Kumar;Seema Bawa.
Vehicular Communications (2014)
A survey on privacy protection in blockchain system
Qi Feng;Debiao He;Sherali Zeadally;Muhammad Khurram Khan.
Journal of Network and Computer Applications (2019)
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
Debiao He;Neeraj Kumar;Jianhua Chen;Cheng-Chi Lee.
Multimedia Systems (2015)
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
Debiao He;Neeraj Kumar;Naveen Chilamkurti.
Information Sciences (2015)
Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid
Anish Jindal;Amit Dua;Kuljeet Kaur;Mukesh Singh.
IEEE Transactions on Industrial Informatics (2016)
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
Sravani Challa;Mohammad Wazid;Ashok Kumar Das;Neeraj Kumar.
IEEE Access (2017)
Fog computing for Healthcare 4.0 environment: Opportunities and challenges
Aparna Kumari;Sudeep Tanwar;Sudhanshu Tyagi;Neeraj Kumar.
Computers & Electrical Engineering (2018)
Clustering in vehicular ad hoc networks
Rasmeet S Bali;Neeraj Kumar;Joel J.P.C. Rodrigues.
Vehicular Communications (2014)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: