Seguir
Prof. Rajendra Kumar
Prof. Rajendra Kumar
Jamia Millia Islamia (A Central University), New Delhi
Dirección de correo verificada de jmi.ac.in
Título
Citado por
Citado por
Año
A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem
SKP Vinod Kumar, Rajendra Kumar
Journal of King Saud University – Computer and Information Sciences, 2018
46*2018
Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups
SK Kumar, V., Kumar, R. & Pandey
International Journal of Information Technology, 2018
23*2018
A Comprehensive Review of Numerical Weather Prediction Models
RK Rashi Aggarwal
International Journal of Computer Applications 74 (18), 44-48, 2013
182013
Mitigating the Authentication Vulnerabilities in Web Applications through Security Requirements
R Kumar
World Congress On Information and Communication Technologies (WICT 2011), 2011
182011
Effect of Training functions of Artificial Neural Networks (ANN) on Time series Forecasting
RAR Kumar
International Journal of Computer Applications 109 (3), 14-17, 2015
162015
Security in Coding Phase of SDLC
R Kumar, SK Pandey, SI Ahson
Third IEEE International Conference on Wireless Communications and Sensor …, 2007
162007
Cryptographic construction using coupled map lattice as a diffusion model to enhanced security
SK Subodh kumar, Rajendra kumar, Sushil kumar
Journal of Information Security and Applications 19 (46), 70-83, 2019
12*2019
Secure Intrusion Detection System for Mobile Adhoc Networks
TS Bharati, R Kumar
Proceedings of the 9th INDIACom; IEEE Conference ID: 35071, Delhi, INDIA …, 2015
92015
INTRUSION DETECTION SYSTEM FOR MANET USING MACHINE LEARNING AND STATE TRANSITION ANALYSIS
TS Bharati, R Kumar
International Journal of Computer Engineering & Technology (IJCET) 6 (12), 1-8, 2015
82015
Security Requirements Development Framework (SRDF)
R Kumar, M K
International Journal of Advanced Research in Computer Science 2 (5), 2011
42011
Elicitation and Structured Representation Modeling of Security Requirements for Authentication Vulnerabilities in web Applications
R Kumar
International Journal of Advanced Research in Computer Science and Software …, 2012
2*2012
Security Requirements and related Developments
R Kumar, K Mustafa
International Journal of Advanced Computing (IJAC) 2 (1), 18-25, 2010
12010
An Enhanced and Secured RSA Public Key Cryptosystem Algorithm Using Chinese Remainder Theorem
SK Kumar, V., Kumar, R. & Pandey
third International Conference, NGCT 2017, Smart and Innovative Trends in …, 2017
2017
Secure Error Handling and Reporting (ErHaR) in Web Applications
R Kumar
International Conference on Technological Advancement and Research, GOA, INDIA, 2013
2013
Reducing the Impact of Code Injection Vulnerabilities for Cloud Offerings
R kumar
International Journal of Advanced Research in Computer Science and Software …, 2013
2013
Revisiting Security Vulnerabilities: Web Applications Perspective
R Kumar
International Journal of Advanced Research in Computer Science and Software …, 2013
2013
Information Security in the Academia
R Kumar, SK Pandey
International Conference on Soft Computing and Intelligent Systems, 275-278, 2007
2007
Security as a Lifecycle Activity: Requirement Phase Perspective
R Kumar, SK Pandey
International Conference on Web Engineering and Applications (ICWA 2007), 87-94, 2007
2007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–18