A new approach for load balancing in cloud computing R Rathore, B Gupta, V Sharma, KK Gola International Journal of Engineering and Computer Science 2 (5), 1636-1640, 2014 | 54 | 2014 |
An empirical study on underwater acoustic sensor networks based on localization and routing approaches KK Gola, M Dhingra, B Gupta, R Rathore Advances in Engineering Software 175, 103319, 2023 | 20 | 2023 |
Effect of oven drying on the nutritional properties of whole egg and its components S Kumaravel, R Hema, A Kamaleshwari, AD Yusuf, M Abu, AN Nasir, ... Int J Food Sci Nutr 1 (1), 4-12, 2011 | 19 | 2011 |
Robust data aggregation, encryption and data transfer in UWSNs G Khan, KK Gola, R Rathore 2015 1st International Conference on Next Generation Computing Technologies …, 2015 | 9 | 2015 |
Modified version of playfair technique to enhance the security of plaintext and key using rectangular and substitution matrix KK Gola, M Dhingra, R Rathore Int. J. Eng. Adv. Technol, 2019 | 6 | 2019 |
RE2R—Reliable Energy Efficient Routing for UWSNs K Gulista, GK Kumar, R Rahul Proceedings of the International Congress on Information and Communication …, 2016 | 4 | 2016 |
SKT: a new approach for secure key transmission using MGPISXFS KK Gola, V Sharma, R Rathore Information Systems Design and Intelligent Applications: Proceedings of …, 2016 | 4 | 2016 |
Secure: dynamic distributed load balancing technique in cloud computing R Rathore, KK Gola, S Rastogi International Journal of Advanced Research in Computer Science 9 (1), 415-418, 2018 | 2 | 2018 |
Key sharing technique to preserve integrity and confidentiality V Sharma, KK Gola, G Khan, R Rathore 2015 Second International Conference on Advances in Computing and …, 2015 | 2 | 2015 |
Secure Key Exchange in Diffie-Hellman Key Exchange Algorithm KK Gola, R Rathore, V Sharma, M Kandpal International Conference of Advance Research and Innovation (ICARI-2015 …, 2015 | 2 | 2015 |
Automated melanoma skin disease detection using the spike herd search algorithm KK Gola, G Khan, R Kanauzia, R Rathore, S Arya IETE Journal of Research 70 (6), 5691-5703, 2024 | 1 | 2024 |
KKG-512: A New Approach for Kryptos Key Generation of Size 512 Bits Using Plaintext KK Gola, G Khan, A Joshi, R Rathore International Conference on Intelligent Computing and Smart Communication …, 2019 | 1 | 2019 |
Detection of Sybil Attacks in Structured P2P Overlay Network M Kaushik, KK Gola, G Khan, R Rathore International Journal of Computer Applications 975, 8887, 2016 | 1 | 2016 |
Implementation and Result Analysis of Priority Based Load Balancing In Cloud Computing R Rathore, B Gupta, V Sharma, KK Gola International Journal of Scientific & Engineering Research 5 (12), 2014 | 1 | 2014 |
Security Strategy for Dynamic Homogeneous WSN V Sharma, G Khan, KK Gola, R Rathore International Journal 4 (3), 2014 | 1 | 2014 |
THE IMPLEMENTATION OF 5G SYSTEM TO MEASURE ENERGY EFFICIENCYAND THROUGHPUT IN END-TO-END COMMUNICATION IN THE INFRASTRUCTURE NETWORKS MP Manivannan, GP Kumar, R Praveen, RN Rahul, RR Khan | | 2021 |
A Frame Work for Implementing Fractal Image Compression and Adaptive Byte Fractal Image Compression in Cloud Computing: A New Approach R Rathore, B Gupta, KK Gola International Journal of Computer Applications 975, 8887, 2017 | | 2017 |
Year of Publication: 2016 M Kaushik, KK Gola, G Khan, R Rathore | | 2016 |
Information Security Issue & Risk Management Concepts RR Anjana Chaudhary International Confrence On Emerging Trends In Engineering & Technology, 2013 | | 2013 |
Penetration Testing: Protecting The Network RR Gaurav Bathla National Confrence On Contemporary Computing, cs-145, 2013 | | 2013 |