A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem SKP Vinod Kumar, Rajendra Kumar Journal of King Saud University – Computer and Information Sciences, 2018 | 46* | 2018 |
Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups SK Kumar, V., Kumar, R. & Pandey International Journal of Information Technology, 2018 | 23* | 2018 |
A Comprehensive Review of Numerical Weather Prediction Models RK Rashi Aggarwal International Journal of Computer Applications 74 (18), 44-48, 2013 | 18 | 2013 |
Mitigating the Authentication Vulnerabilities in Web Applications through Security Requirements R Kumar World Congress On Information and Communication Technologies (WICT 2011), 2011 | 18 | 2011 |
Effect of Training functions of Artificial Neural Networks (ANN) on Time series Forecasting RAR Kumar International Journal of Computer Applications 109 (3), 14-17, 2015 | 16 | 2015 |
Security in Coding Phase of SDLC R Kumar, SK Pandey, SI Ahson Third IEEE International Conference on Wireless Communications and Sensor …, 2007 | 16 | 2007 |
Cryptographic construction using coupled map lattice as a diffusion model to enhanced security SK Subodh kumar, Rajendra kumar, Sushil kumar Journal of Information Security and Applications 19 (46), 70-83, 2019 | 12* | 2019 |
Secure Intrusion Detection System for Mobile Adhoc Networks TS Bharati, R Kumar Proceedings of the 9th INDIACom; IEEE Conference ID: 35071, Delhi, INDIA …, 2015 | 9 | 2015 |
INTRUSION DETECTION SYSTEM FOR MANET USING MACHINE LEARNING AND STATE TRANSITION ANALYSIS TS Bharati, R Kumar International Journal of Computer Engineering & Technology (IJCET) 6 (12), 1-8, 2015 | 8 | 2015 |
Security Requirements Development Framework (SRDF) R Kumar, M K International Journal of Advanced Research in Computer Science 2 (5), 2011 | 4 | 2011 |
Elicitation and Structured Representation Modeling of Security Requirements for Authentication Vulnerabilities in web Applications R Kumar International Journal of Advanced Research in Computer Science and Software …, 2012 | 2* | 2012 |
Security Requirements and related Developments R Kumar, K Mustafa International Journal of Advanced Computing (IJAC) 2 (1), 18-25, 2010 | 1 | 2010 |
An Enhanced and Secured RSA Public Key Cryptosystem Algorithm Using Chinese Remainder Theorem SK Kumar, V., Kumar, R. & Pandey third International Conference, NGCT 2017, Smart and Innovative Trends in …, 2017 | | 2017 |
Secure Error Handling and Reporting (ErHaR) in Web Applications R Kumar International Conference on Technological Advancement and Research, GOA, INDIA, 2013 | | 2013 |
Reducing the Impact of Code Injection Vulnerabilities for Cloud Offerings R kumar International Journal of Advanced Research in Computer Science and Software …, 2013 | | 2013 |
Revisiting Security Vulnerabilities: Web Applications Perspective R Kumar International Journal of Advanced Research in Computer Science and Software …, 2013 | | 2013 |
Information Security in the Academia R Kumar, SK Pandey International Conference on Soft Computing and Intelligent Systems, 275-278, 2007 | | 2007 |
Security as a Lifecycle Activity: Requirement Phase Perspective R Kumar, SK Pandey International Conference on Web Engineering and Applications (ICWA 2007), 87-94, 2007 | | 2007 |