default search action
Devender Kumar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Devender Kumar, Satish Chand, Bijendra Kumar:
A secure three-factor authentication protocol for mobile networks. Int. J. Inf. Comput. Secur. 23(2): 119-138 (2024) - [j18]Khushil Kumar Saini, Damandeep Kaur, Devender Kumar, Bijendra Kumar:
An efficient three-factor authentication protocol for wireless healthcare sensor networks. Multim. Tools Appl. 83(23): 63699-63721 (2024) - [j17]Lalit Negi, Devender Kumar:
A Bilinear Mapping Based Ring Signature Scheme with Batch Verification for Applications in VANETs. Wirel. Pers. Commun. 134(4): 1987-2011 (2024) - [i1]David Haag, Devender Kumar, Sebastian Gruber, Mahdi Sareban, Gunnar Treff, Josef Niebauer, Christopher Bull, Jan David Smeddinck:
The Last JITAI? The Unreasonable Effectiveness of Large Language Models in Issuing Just-in-Time Adaptive Interventions: Fostering Physical Activity in a Prospective Cardiac Rehabilitation Setting. CoRR abs/2402.08658 (2024) - 2023
- [j16]Devender Kumar, Sadasivan Puthusserypady, Helena Dominguez, Kamal Sharma, Jakob E. Bardram:
An investigation of the contextual distribution of false positives in a deep learning-based atrial fibrillation detection algorithm. Expert Syst. Appl. 211: 118540 (2023) - [j15]Neerul, Devender Kumar:
Cryptanalysis and improvement of an authentication protocol for wireless sensor networks. Trans. Emerg. Telecommun. Technol. 34(5) (2023) - [j14]Devender Kumar, Siddharth Jain, Aasif Khan, Pranav Sarv Pathak:
An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things. J. Ambient Intell. Humaniz. Comput. 14(5): 5067-5083 (2023) - [c6]Pavithren V. S. Pakianathan, Daniela Wurhofer, Devender Kumar, Josef Niebauer, Jan D. Smeddinck:
Multi-Stakeholder Design for Complex Digital Health Systems: Development of a Modular Open Research Platform (MORE). dHealth 2023: 204-209 - [c5]Aarti Goel, Devender Kumar, Deepak Kumar Sharma:
Cryptanalysis of an Authentication Scheme for WSN within an IoT Environment. IC3 2023: 587-590 - [c4]Madeleine Flaucher, Anastasiya Zakreuskaya, Katharina M. Jäger, Robert Richer, Jan David Smeddinck, Devender Kumar, Sophie Grimme, Julia Klein, Robert Hrynyschyn, Bjoern M. Eskofier, Heike Leutheuser:
Your Health, Your Data: Combining Interdisciplinary Views, Concepts, and Practices to Empower Patients in Their Engagement With Personal Health Data. MuC (Workshopband) 2023 - 2022
- [j13]Devender Kumar, Abdolrahman Peimankar, Kamal Sharma, Helena Dominguez, Sadasivan Puthusserypady, Jakob E. Bardram:
Deepaware: A hybrid deep learning and context-aware heuristics-based model for atrial fibrillation detection. Comput. Methods Programs Biomed. 221: 106899 (2022) - [j12]Devender Kumar, Raju Maharjan, Alban Maxhuni, Helena Dominguez, Anne Frølich, Jakob E. Bardram:
mCardia: A Context-Aware ECG Collection System for Ambulatory Arrhythmia Screening. ACM Trans. Comput. Heal. 3(2): 20:1-20:28 (2022) - [j11]Damandeep Kaur, Khushil Kumar Saini, Devender Kumar:
Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multim. Tools Appl. 81(27): 39367-39385 (2022) - 2021
- [j10]Devender Kumar, Steven Jeuris, Jakob E. Bardram, Nicola Dragoni:
Mobile and Wearable Sensing Frameworks for mHealth Studies and Applications: A Systematic Review. ACM Trans. Comput. Heal. 2(1): 8:1-8:28 (2021) - [j9]Devender Kumar, Harmanpreet Singh Grover, Damandeep Kaur, Adarsh Verma, Khushil Kumar Saini, Bijendra Kumar:
An efficient anonymous user authentication and key agreement protocol for wireless sensor networks. Int. J. Commun. Syst. 34(5) (2021) - [j8]Damandeep Kaur, Devender Kumar:
Cryptanalysis and improvement of a two-factor user authentication scheme for smart home. J. Inf. Secur. Appl. 58: 102787 (2021) - [j7]Devender Kumar:
A secure and efficient user authentication protocol for wireless sensor network. Multim. Tools Appl. 80(18): 27131-27154 (2021) - 2020
- [j6]Devender Kumar, Satish Chand, Bijendra Kumar:
Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps. IET Networks 9(6): 315-325 (2020) - [j5]Harmanpreet Singh Grover, Adarsh, Devender Kumar:
Cryptanalysis and improvement of a three-factor user authentication scheme for smart grid environment. J. Reliab. Intell. Environ. 6(4): 249-260 (2020)
2010 – 2019
- 2019
- [j4]Damandeep Kaur, Devender Kumar, Khushil Kumar Saini, Harmanpreet Singh Grover:
An improved user authentication protocol for wireless sensor networks. Trans. Emerg. Telecommun. Technol. 30(10) (2019) - [j3]Devender Kumar, Harmanpreet Singh Grover, Adarsh:
A secure authentication protocol for wearable devices environment using ECC. J. Inf. Secur. Appl. 47: 8-15 (2019) - [j2]Devender Kumar, Satish Chand, Bijendra Kumar:
Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. J. Ambient Intell. Humaniz. Comput. 10(2): 641-660 (2019) - 2018
- [j1]Devender Kumar, Satish Chand, Bijendra Kumar:
A PKC-based user authentication scheme without smart card. J. Intell. Fuzzy Syst. 35(5): 5379-5390 (2018) - [c3]Devender Kumar, Elena Di Lascio, Murad Ahmad, Mikko Yliniemi:
Calmify: Measuring the Effectiveness of Personalized Meditation Techniques Using Mobile Technologies. UbiComp/ISWC Adjunct 2018: 754-757 - [c2]Pegah Hafiz, Raju Maharjan, Devender Kumar:
Usability of a mood assessment smartphone prototype based on humor appreciation. MobileHCI Adjunct 2018: 151-157 - 2016
- [c1]Devender Kumar, Amit Sharma:
Electrooculogram-based virtual reality game control using blink detection and gaze calibration. ICACCI 2016: 2358-2362
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint