A lightweight biometrics based remote user authentication scheme for IoT services PK Dhillon, S Kalra Journal of Information Security and Applications 34, 255-270, 2017 | 201 | 2017 |
Multi-factor user authentication scheme for IoT-based healthcare services PK Dhillon, S Kalra Journal of Reliable Intelligent Environments, 1-20, 2018 | 109 | 2018 |
Secure multi‐factor remote user authentication scheme for Internet of Things environments PK Dhillon, S Kalra International Journal of Communication Systems 30 (16), e3323, 2017 | 109 | 2017 |
Elliptic curve cryptography for real time embedded systems in IoT networks PK Dhillon, S Kalra 2016 5th international conference on wireless networks and embedded systems …, 2016 | 37 | 2016 |
Secure and efficient ECC based SIP authentication scheme for VoIP communications in internet of things PKD Sheetal Kalra Multimedia Tools and Applications 78 (6), 1-24, 2019 | 35* | 2019 |
Analysis of quality of the design of the object oriented software using fuzzy logic J Mago, P Kaur International Conference on Recent Advances and Future Trends in Information …, 2012 | 20 | 2012 |
A secure multi-factor ECC based authentication scheme for Cloud-IoT based healthcare services PK Dhillon, S Kalra Journal of Ambient Intelligence and Smart Environments 11 (2), 149-164, 2019 | 17 | 2019 |
Handoff optimization for wireless and mobile networks using fuzzy logic P Dhand, P Dhillon International Journal of computer applications 63 (14), 31-35, 2013 | 17 | 2013 |
A novel framework to image edge detection using cellular automata PK Dhillon Int. J. Comput. Appl 1, 1-5, 2012 | 12 | 2012 |
A secure multifactor remote user authentication scheme for Internet of Multimedia Things environment PK Dhillon, S Kalra International Journal of Communication Systems 32 (15), e4077, 2019 | 7 | 2019 |
HANDOFF MANAGEMENT: ISSUES AND CHALLENGES. P Dhand, PK Dhillon International Journal of Advanced Research in Computer Science 9 (1), 2018 | 3 | 2018 |
Estimating Software Reusability from OO Metrics using Fuzzy Logic D Pooja, DP Kaur, M Jagmohan Apeejay Journal of Computer Science and Applications 3, 29-35, 2015 | 3 | 2015 |
Fuzzy Logic Approach to Forecast the Extendibility/Extensibility in Object Oriented Design using an Integrated Model R Vir, P Dhillon, J Dhillon International Journal of Computer Applications 94 (9), 2014 | 2 | 2014 |
Empirical validation of MOOD metrics to predict Software Reuse PK Dhillon, P Dhand International Journal of Emerging Trends & Technology in Computer Science …, 2017 | 1 | 2017 |
Biometrics based remote user authentication scheme for session initiation protocol using ECC with user anonymity PK Dhillon, S Kalra NeuroQuantology 21 (5), 1191, 2023 | | 2023 |
An Improved Edge Detection algorithm using Cellular Automata PD Parwinder Kaur Dhillon International Journal of Electronics & Communication 5 (9), 7-14, 2017 | | 2017 |
Adaptive threshold and hysteresis based handoff initialization in wireless networks PK Dhillon, P Dhand, S Mittal 2nd International Conference on Computing Sciences(Wilkes100), 207-215, 2013 | | 2013 |
Comparative Study of derivatives based edge detectors P kaur, D Thakur Apeejay Journal of Computer Science and Applications(ISSN 0974-5742), 231-234, 2011 | | 2011 |
Comparative Study of First order Derivatives Based Edge Detectors in Medical Imaging S Malhotra, E Walia, P Dhillon PCTE Journal of Computer Sciences (ISSN-0973-4058) 6 (1), 18-22, 2009 | | 2009 |
Attacks and Countermeasures for Secure User Authentication Mechanisms G Sharma, PK Dhillon, EM Sharma, P Banga | | |