Hybrid Homomorphic Encryption Scheme for Secure Cloud Data Storage B Seth, S Dalal, R Kumar Recent Advances in Computational Intelligence, 71-92, 2019 | 56 | 2019 |
Robustness of Digital Image Watermarking Techniques against brightness and rotation attacks H Verma, A Singh, R Kumar IJCSIS) International Journal of Computer Science and Information Security, 2009 | 41 | 2009 |
Securing Bioinformatics Cloud for Big Data: Budding Buzzword or a Glance of the Future B Seth, S Dalal, R Kumar Recent Advances in Computational Intelligence, 121-147, 2019 | 35 | 2019 |
Blocking of sql injection attacks by comparing static and dynamic queries J Minhas, R Kumar IJ Computer Network and Information Security 2, 1-9, 2013 | 21 | 2013 |
Analysis and design of protocol for enhanced threshold proxy signature scheme based on RSA for known signers R Kumar, HK Verma, R Dhir Wireless Personal Communications 80, 1281-1345, 2015 | 18 | 2015 |
Cryptanalysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers R Kumar, HK Verma, R Dhir Mathematical Problems in Engineering 2013 (1), 790257, 2013 | 17 | 2013 |
Security analysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers R Kumar, HK Verma, R Dhir International Journal of Computer Network and Information Security 4 (9), 63, 2012 | 17 | 2012 |
International Journal of Computer Network and Information Security (IJCNIS) J Minhas, R Kumar | 16* | |
Design of a Low-Cost Sensor-Based IOT System for Smart Irrigation K Singh, R Kumar Applications in Ubiquitous Computing, 59-79, 2021 | 15 | 2021 |
An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for known Signers R Kumar, HK Verma IEEE 2nd International Advance Computing Conference, TU, India, 2010 | 15 | 2010 |
ANALYSIS AND DESIGN OF AN OPTIMIZED SECURE AUDITING PROTOCOL FOR STORING DATA DYNAMICALLY IN CLOUD COMPUTING, R Kumar, G Singh International Conference on Processing of Materials, Minerals and Energy …, 2016 | 14 | 2016 |
A hybrid feature extraction technique for content based medical image retrieval using segmentation and clustering techniques Madhu, R Kumar Multimedia Tools Applications, 1380-7501, 2022 | 13 | 2022 |
The Pipeline Process of Signature-based and Behavior-based Malware Detection M Goyal, R Kumar 2020 IEEE 5th International Conference on Computing Communication and …, 2020 | 13 | 2020 |
A Literature Survey on various Image Encryption & Steganography Techniques M Dahiya, R Kumar 2018 First International Conference on Secure Cyber Computing and …, 2018 | 12 | 2018 |
Machine Learning for Malware Detection on Balanced and Imbalanced Datasets M Goyal, R Kumar 2020 International Conference on Decision Aid Sciences and Application (DASA …, 2020 | 11 | 2020 |
Comparison of Threshold Proxy Signature Schemes. HK Verma, K Kaur, R Kumar Security and Management, 227-231, 2008 | 11 | 2008 |
Analysis of lightweight cryptography algorithms for IoT communication N Lata, R Kumar Congress on Intelligent Systems: Proceedings of CIS 2020, Volume 2, 397-406, 2021 | 10 | 2021 |
Information Technology Empowers by Women R Kumar, R Kochher International Journal of Science and Emerging Trends with latest Trends …, 2011 | 10 | 2011 |
Information Technology Empowers by Women R Kumar, R Kochher International Journal for Science and Emerging Technologies with Latest …, 2011 | 10 | 2011 |
Secure threshold proxy signature scheme based on RSA for known signers R Kumar, HK Verma Journal of Information Assurance and Security, USA 5 (4), 319-326, 2010 | 10 | 2010 |