Network forensic investigation protocol to identify true origin of cyber crime RY Patil, SR Devane Journal of King Saud University-Computer and Information Sciences 34 (5 …, 2022 | 41 | 2022 |
Formal verification of secure evidence collection protocol using BAN logic and AVISPA PR Yogesh Procedia Computer Science 167, 1334-1344, 2020 | 40 | 2020 |
A New Security Protocol Using Hybrid Cryptography Algorithms RYP Darshan Bhole , Aditi Mote International Journal of Computer Sciences and Engineering 4 (2), 18-22, 2016 | 30 | 2016 |
Unmasking of source identity, a step beyond in cyber forensic RY Patil, SR Devane Proceedings of the 10th international conference on security of information …, 2017 | 26 | 2017 |
Management of IoT devices security using blockchain—a review G Pattewar, N Mahamuni, H Nikam, O Loka, R Patil Sentimental Analysis and Deep Learning: Proceedings of ICSADL 2021, 735-743, 2022 | 23 | 2022 |
A rate limiting mechanism for defending against flooding based distributed denial of service attack RY Patil, L Ragha 2011 world congress on information and communication technologies, 182-186, 2011 | 21 | 2011 |
Backtracking tool root-tracker to identify true source of cyber crime PR Yogesh Procedia Computer Science 171, 1120-1128, 2020 | 19 | 2020 |
Primordial fingerprinting techniques from the perspective of digital forensic requirements PR Yogesh, SR Devane 2018 9th international conference on computing, communication and networking …, 2018 | 18 | 2018 |
A provably secure data sharing scheme for smart gas distribution grid using fog computing RY Patil, YH Patil, R Kachhoria, S Lonare International Journal of Information Technology 14 (6), 2927-2939, 2022 | 15 | 2022 |
Ensuring accountability in digital forensics with proxy re-encryption based chain of custody RY Patil, YH Patil, A Bannore, M Ranjanikar International Journal of Information Technology, 1-13, 2024 | 13 | 2024 |
Hash Tree-Based Device Fingerprinting Technique for Network Forensic Investigation DSR Patil R.Y. Springer Lecture Notes in Electrical Engineering 672, 201-209, 2020 | 12 | 2020 |
Review on applications of blockchain for electronic health records systems S Deore, R Bachche, A Bichave, R Patil Second International Conference on Image Processing and Capsule Networks …, 2022 | 10 | 2022 |
A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute‑based signcryption RY Patil International Journal of Information Technology, 2023 | 9 | 2023 |
Identity-based signcryption scheme for medical cyber physical system in standard model RY Patil, YH Patil International Journal of Information Technology 14 (5), 2275-2283, 2022 | 9 | 2022 |
Digital evidence management system for cybercrime investigation using proxy re-encryption and blockchain H Chougule, S Dhadiwal, M Lokhande, R Naikade, R Patil Procedia Computer Science 215, 71-77, 2022 | 9 | 2022 |
Achieving flatness: with video captcha, location tracking, selecting the honeywords N Patil, R Patil 2018 International Conference on Smart City and Emerging Technology (ICSCET …, 2018 | 9 | 2018 |
A dynamic rate limiting mechanism for flooding based distributed denial of service attack RY Patil, L Ragha IET Digital Library, 2012 | 8 | 2012 |
An efficient proxy signature–based authority delegation scheme for medical cyber physical systems A Bannore, RY Patil, SR Devane Cyber Security Threats and Challenges Facing Human Life, 13-23, 2022 | 6 | 2022 |
EHR-Sec: a blockchain based security system for electronic health S Deore, R Bachche, A Bichave, R Patil International Conference on Soft Computing and Signal Processing, 295-303, 2021 | 6 | 2021 |
Advanced security in 2LQR code generation and document authentication SR Gaikwad, RY Patil, DG Borse 2019 international conference on nascent technologies in engineering (ICNTE …, 2019 | 6 | 2019 |