List of publications


1. Brijesh Kumar Chaurasia, ShekharVerma, “Maximising Anonymity of a Vehicle”,
Inderscience, International Journal of Autonomous and Adaptive Communications Systems
(IJAACS), Special Issue on: "Security, Trust, Privacy in DTN and Vehicular
Communications”. Vol. 3, No. 2, DOI : 10.1504/IJAACS.2010.031091, Pages: 198-216,2010.

2. Brijesh Kumar Chaurasia, Shekhar Verma, G. S. Tomar, Ajith Abraham “Optimizing
Pseudonym Updation in Vehicular Ad-hoc Networks ”, Journal of Transactions on
Computational Science IV, Special Issue on Security in Computing, LNCS volume 5430,
ISBN: 978-3-642-01003, Pages: 136-148, 2009.

3. Brijesh Kumar Chaurasia, Shekhar Verma, Dr. G. S. Tomar “Mechanism for Privacy
Preservation in VANETs”, Journal of International Journal of Grid and High Performance
Computing (IJGHPC), Special Issue on: “Grid computing and Security”. (Accepted)

4. Brijesh Kumar Chaurasia, VikasPorwal, ShekharVerma, Dr. G. S. Tomar “Toll tax using
VANETs”, International Journal of Simulation, system, Science & Technology (IJSSSC),
Special Issue on: “Analytical Models and Applications”. (Under review)

5. MritunjayRai, Shekhar Verma, ShashikalaTapaswi: A Power Aware Minimum Connected
Dominating Set for Wireless Sensor Networks. JNW 4(6): 511-519 (2009)

6. VinayRishiwal, Shekhar Verma and S. K. Bajpai (2009), “QoS Based Power Aware
Routing in MANETs,” International Journal of Computer Theory and Engineering
(IJCTE), vol. 1, no. 1, pp. 47-54, Singapore.

7. VinayRishiwal, Mano Yadav, S. Verma and S. K. Bajpai (2009), “Power Aware Routing in
adhoc Wireless Networks,” International Journal of Compute Science and Technology,
vol. 9, no. 2, pp. 101-109, Argentina.

8. VinayRishiwal and Shekhar Verma (2008), “Analysis of Energy Consumption Pattern for
On Demand Adhoc Routing Protocols,” International Journal of Computer Science and
Network Security (IJCSNS), vol. 8, no. 11, pp. 429-435, South Korea.

9. VinayRishiwal, A. Kush and Shekhar Verma (2006), “Backbone Nodes Based Stable
Routing in Mobile Adhoc Networks,” International Journal of Ubiquitous Computing and
Communication (UBICC), vol. 2, no. 3, pp. 1-5, South Korea.

10. Run Pattern Encoding in CAVLC. Under review in Science Letters.

11. Shekhar Verma, Mr. Amit Kant Pandit, A* Prune Modified Algorithm In Video
Compression UbiCC Journal - Volume 3 Number 5 , Volume 3 No. 5 , 11/20/2008

12. Prabakaran, S., R. Sahu, S. Verma Feature Selection using Haar Wavelet Power Spectrum,
International Journal on BMC Bioinformatics, 7: 432, pp. 1-11, October 2006.

13. S. Prabakaran, R. Sahu, S. Verma (2006), Characteristics of Microarray Data using
Wavelet Power Spectrum, International Journal of Knowledge-based and Intelligence
Engineering Systems (U.K), Vol. 10, No.6, pp. 493- 501.

14. S. Prabakaran, R. Sahu, S. Verma (2006), Analysis of Microarray Data under Wavelet
Power Spectrum, IAENG International Journal of Engineering Letters, Hong Kong Vol. 13
No. 3, EL_13_3_17.

15. S. Prabakaran, R. Sahu, S. Verma (2006), A Clustering and Feature Selection Method
Using Wavelet Power Spectrum, IAENG International Journal of Computer Science, 32:4,
pages 419-423S.

16. S. Prabakaran, R.Sahu and S. Verma (2007), Classification of Multi class Dataset using
Wavelet Power Spectrum, International Journal of Data Mining and Knowledge Discovery
(Springer-Verlog), Vol. 15, No. 3, pp. 297-319.

17. S. Prabakaran, R. Sahu and S. Verma, (2008), A Wavelet Approach for Classification of
Microarray Data, International Journal of Wavelets, Multiresolution and Information
Processing (IJWMIP), Vol. 6, Issue. 3 (May 2008) Page: 375- 389.

18. Image Index Based Digital Watermarking Technique for Ownership Claim and Buyer
Fingerprinting Book: (Chapter 23) Advances in Electrical Engineering and Computational
Science Springer 2009.

19. Sarabjeet Singh Bedi, Shekhar Verma, Geetam S. Tomar, NPT Based Video Watermarking
with Non-overlapping Block Matching. Transactions on Computational Science 11: 270-
292 (2010)

20. Sumeet Gupta, Shekhar Verma, G. S. Tomar, Raj Abrol, Intelligent Industrial Data
Acquisition and Energy Monitoring using Wireless Sensor Networks. IJGHPC 2(3): 44-59
(2010)

21. S. Kotwal, Shekhar Verma, G. S. Tomar, Raj Abrol, One Anchor Distance and Angle
Based Multi - Hop Adaptive Iterative Localization Algorithm for Wireless Sensor
Networks. IJGHPC 2(3): 31-43 (2010)

22. Manish Kumar, Pritish Kumar Varadwaj, Shekhar Verma, Two-phase clustering based
aggregation of sensor data. IJDMMM 2(3): 216-237 (2010)

23. SeemaNirved Pandey, Shekhar Verma and Laxmi Srivastava (2006), RBF Neural Network
for Estimating Locational Marginal Pricesin Deregulated Electricity Market. Research in
Computing Science, vol. 23, pp. 63-74.

24. Brijesh Kumar Chaurasia and Shekhar Verma, “Maximising Anonymity of a Vehicle,” In
International Journal of Autonomous and Adaptive Communications Systems (IJAACS),
Special Issue on: Security, Trust, Privacy in DTN and Vehicular
Communications,Inderscience, Vol. 3, No. 2, pp. 198-216, 2010.

25. Brijesh Kumar Chaurasia, Shekhar Verma and Dr. G. S. Tomar, “Mechanism for Privacy
Preservation in VANETs,” In the International Journal of Grid and High Performance
Computing (IJGHPC), Special Issue on: Grid computing and Security, IGI, Vol. 2, No 2,
pp. 12-22, 2010.

26. Brijesh Kumar Chaurasia and Shekhar Verma “Infrastructure based Authentication in
VANETs,” In International Journal of Multimedia and Ubiquitous Engineering, Vol. 6,
No. 2, pp. 41-54, 2011.

27. Brijesh Kumar Chaurasia and ShekharVerma, “Conditional Privacy through Ring Signature
in Vehicular Ad-hoc Networks,” In the Transactions on Computational Science, LNCSSpringer,
Trans. on Comput. Sci. XIII, LNCS 6750, pp. 147–156, 2011.

28. Brijesh Kumar Chaurasia, Shekhar Verma, “Secure Toll Collection in VANETs,” In
International Journal of Information Technology, Communications and Convergence
(IJITCC), Inderscience, 2011. (Accepted)

29. Brijesh Kumar Chaurasia andShekhar Verma, “Privacy Preserving in VANETs”,In IUP
Journal of Systems Management, Vol. IX, No. 2, 2011.

30. PradheepkumarSingaravelu, Shekhar Verma and Charles A. Shoniregun,“
Evaluating the Practicability of Multivariate Cryptosystems for WSN”, International journal on Internet
Technology and Secured Transactions (IJITST), ISSN: 1748 - 5703 , 2011.

31. Ranjeet Singh Tomar and ShekharVerma, “Neural Network Based Lane Change Trajectory
Prediction in Autonomous Vehicles”, Springer Transactions on Computational Science,
Vol. 13, No. 2, Pages: 125-147, 2011.

32. Ranjeet Singh Tomar, Shekhar Verma, DrGeetam Singh Tomar, “Prediction of Lane
Change Trajectories through Neural Network in Cooprerative Driving System”, IGI
International Journal of Grid and High Performance Computing, 2011 (In Press).

33. Ranjeet Singh Tomar, Shekhar Verma, Dr. Geetam Singh Tomar, “Safety of Lane Change
Maneuver Through A Priori Prediction of Trajectory Using Neural Networks”,
International Journal of Network Protocols and Algorithms, 2011 (Accepted).

34. Ranjeet Singh Tomar and Shekhar Verma, “Vehicular Communication for Enhancing
Safety in Transportation System”, The IUP Journal of Systems Management, vol. xx, no.
xx, pp. xx-xx, 2011.

35. Ranjeet Singh Tomar and Shekhar Verma,“RSU Assisted Channel Allocation in
VANETs”, International Journal of Contemporary Research in Engineering and
Technology, 2011. (In Press)

36. Ranjeet Singh Tomar and Shekhar Verma, “Trajectory Predictions of Lane Changing
Vehicles using SVM”, Inderscience, International Journal of Vehicle Safety (IJVS), Vol.5,
No.4, pp.345 - 355, 2011.

37. Brijesh Kumar Chaurasia, Shekhar Verma, “Model Based Verification of Privacy
Preserving Authentication Protocol for VANETs”, Inderscience,International Journal of
Information Technology, Communications and Convergence. IJITCC 2(2): 120-137 (2012)

38. PragatiPriyadarshinee and Shekhar Verma, “Evaluation of Non-Functional Attributes using
Web-Based Architecture”, International Journal of Engineering Science and Technology
(IJEST), 3(3), 1802 - 1808, 2011.

39. Performance Analysis of Multivariate Cryptosystem Schemes for Wireless Sensor
Network, International Journal on Computers and Electrical Engineering (Elsevier),
(Accepted 2012).

40. Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor
Networks, International Journal of Computer Network and Information Security, pp.10-18,
vol.6, June 2012.

41. Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN, International
Journal of Computer Network and Information Security, Vol.4, No.4, May 2012.

42. RSU Supported MAC protocol for vehicular ad hoc networks, International Journal of
Vehicle Safety (Accepted May 2012)

43. An Energy Efficient Anti-Traffic Analysis Privacy Preservation in WSN, International
Journal of Computer Network and Information Security (Accepted May 2012)

44. Privacy Preserving Mutual Authentication in WiMAX, International Journal of
Information Technology, Communications and Convergence (Accepted May 2012).

45. XQuery based Query Processing Architecture in Wireless Sensor Networks, International
Journal of Computer Applications, (Volume 43/Number 23 (ISBN: 973-93-80867-82-8)),
May 2012

46. An Energy Efficient Approach for Clustering in WSN using Fuzzy Logic, International
Journal of Computer Applications, Volume 44/Number 18 (ISBN: 973-93-80867-76-3)),
April 2012.

47. MAC Layer Performance: Study and Analysis for Different Mobility Conditions in WSN,
International Journal of Wireless & Mobile Networks, 3(6), pp. 117 – 127, 2012.

48. Feasibility of Position based Multivariate Cryptosystems for WSN International Journal of
Internet Technology and Secured Transactions, (Accepted May 2012).

49. Evaluating the Practicability of Multivariate Cryptosystems for WSN”, International
journal on Internet Technology and Secured Transactions, ISSN: 1748 - 5703, 2011

50. Energy Consumption Patterns for Different Mobility Conditions in WSN, Wireless Sensor
Network, 2011.

51. Approaches of Self Localization in Wireless Sensor Networks and Directions in 3D,
International Journal of Computer Applications, (Volume 50/Number 11 (ISBN: 973-93-
80869-60-8))

52. RSSI WSN localization with Analysis of Energy Consumption and Communication,
International Journal of Computer Applications, (Volume 50/Number 11 (ISBN: 973-93-
80869-60-8))

53. Enhanced Energy Efficient Privacy Provisioning in WSN, WSEAS Transactions on
Communications, E-ISSN: 2224-2864, pp. 262-273 Issue 7, Volume 11, July 2012.

54. Efficient Spatial Privacy Preserving Scheme for Sensor Network, Springer, Central
European Journal of Engineering (Accepted 2012)

55. Privacy Preservation in Wireless Sensor Networks using Ring Signature, Elsevier, Journal
of King Saud University - Engineering Sciences, (Under Final Review Stage)

56. Identification of Markov Random Fields in Wireless Sensor Networks, International
Journal of Sensor Networks (IJSNET) [under second review].

57. Secure Data Aggregation in Wireless Sensor Networks using Homomorphic Encryption,
International Journal of Electronics (Taylor and Francis), 2014 [Accepted and under
publication].

58. Secure pay while on move toll collection using VANET, Computer Standards and
Interfaces 36 (2) PP. 403 - 411, 2014. doi: 10.1016/j.csi.2013.08.011.

59. Privacy Provisioning in Wireless Sensor Networks, Wireless Personal Communications
PP. 1 - 26, 2013. doi: 10.1007/s11277-013-1411-6

60. GMCA: A greedy multilevel clustering algorithm for data gathering in wireless sensor
networks, International Journal of Communication Networks and Distributed Systems 11
(2) PP. 198 - 213, 2013. doi: 10.1504/IJCNDS.2013.055518

61. Performance analysis of multivariate cryptosystem schemes for wireless sensor network,
Computers and Electrical Engineering 39 (6) PP. 1880 - 1893, 2013. doi: 10.1016/j.
compeleceng.2012.07.010

62. Lane change trajectory prediction using artificial neural network, International Journal of
Vehicle Safety 6 (3) PP. 213 - 234, 2013. doi: 10.1504/IJVS.2013.055015.

63. Optimal Positioning of Base Station in Wireless Sensor Networks: A Survey, Intelligent
Computing, Networking, and Informatics, 1135-1143.

64. Performance analysis of fuzzy logic-based geographical node-disjoint path routing for
WSNs, International Journal of Electronics(Taylor and Francis), 101 (4), pp. 435-440,
2014.

65. Cooperative spectrum sensing based on two-stage detectors with multiple energy detectors
and adaptive double threshold in cognitive radio networks, Canadian Journal of Electrical
and Computer Engineering, 36 (4), 6776586, pp. 172-180, 2013.



HOD - Information Technology
Chairman - Network Committee
//