Suivre
Dr. Raman Kumar
Dr. Raman Kumar
I.K. Gujral Punjab Technical University
Adresse e-mail validée de ptu.ac.in
Titre
Citée par
Citée par
Année
Hybrid Homomorphic Encryption Scheme for Secure Cloud Data Storage
B Seth, S Dalal, R Kumar
Recent Advances in Computational Intelligence, 71-92, 2019
562019
Robustness of Digital Image Watermarking Techniques against brightness and rotation attacks
H Verma, A Singh, R Kumar
IJCSIS) International Journal of Computer Science and Information Security, 2009
412009
Securing Bioinformatics Cloud for Big Data: Budding Buzzword or a Glance of the Future
B Seth, S Dalal, R Kumar
Recent Advances in Computational Intelligence, 121-147, 2019
352019
Blocking of sql injection attacks by comparing static and dynamic queries
J Minhas, R Kumar
IJ Computer Network and Information Security 2, 1-9, 2013
212013
Analysis and design of protocol for enhanced threshold proxy signature scheme based on RSA for known signers
R Kumar, HK Verma, R Dhir
Wireless Personal Communications 80, 1281-1345, 2015
182015
Cryptanalysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers
R Kumar, HK Verma, R Dhir
Mathematical Problems in Engineering 2013 (1), 790257, 2013
172013
Security analysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers
R Kumar, HK Verma, R Dhir
International Journal of Computer Network and Information Security 4 (9), 63, 2012
172012
International Journal of Computer Network and Information Security (IJCNIS)
J Minhas, R Kumar
16*
Design of a Low-Cost Sensor-Based IOT System for Smart Irrigation
K Singh, R Kumar
Applications in Ubiquitous Computing, 59-79, 2021
152021
An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for known Signers
R Kumar, HK Verma
IEEE 2nd International Advance Computing Conference, TU, India, 2010
152010
ANALYSIS AND DESIGN OF AN OPTIMIZED SECURE AUDITING PROTOCOL FOR STORING DATA DYNAMICALLY IN CLOUD COMPUTING,
R Kumar, G Singh
International Conference on Processing of Materials, Minerals and Energy …, 2016
142016
A hybrid feature extraction technique for content based medical image retrieval using segmentation and clustering techniques
Madhu, R Kumar
Multimedia Tools Applications, 1380-7501, 2022
132022
The Pipeline Process of Signature-based and Behavior-based Malware Detection
M Goyal, R Kumar
2020 IEEE 5th International Conference on Computing Communication and …, 2020
132020
A Literature Survey on various Image Encryption & Steganography Techniques
M Dahiya, R Kumar
2018 First International Conference on Secure Cyber Computing and …, 2018
122018
Machine Learning for Malware Detection on Balanced and Imbalanced Datasets
M Goyal, R Kumar
2020 International Conference on Decision Aid Sciences and Application (DASA …, 2020
112020
Comparison of Threshold Proxy Signature Schemes.
HK Verma, K Kaur, R Kumar
Security and Management, 227-231, 2008
112008
Analysis of lightweight cryptography algorithms for IoT communication
N Lata, R Kumar
Congress on Intelligent Systems: Proceedings of CIS 2020, Volume 2, 397-406, 2021
102021
Information Technology Empowers by Women
R Kumar, R Kochher
International Journal of Science and Emerging Trends with latest Trends …, 2011
102011
Information Technology Empowers by Women
R Kumar, R Kochher
International Journal for Science and Emerging Technologies with Latest …, 2011
102011
Secure threshold proxy signature scheme based on RSA for known signers
R Kumar, HK Verma
Journal of Information Assurance and Security, USA 5 (4), 319-326, 2010
102010
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20