Amassing the security: An enhanced authentication protocol for drone communications over 5G networks T Wu, X Guo, Y Chen, S Kumari, C Chen Drones 6 (1), 10, 2021 | 65 | 2021 |
Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey S Kumari, M Singh, R Singh, H Tewari Software: Practice and Experience 52 (10), 2047-2076, 2022 | 27 | 2022 |
A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices S Kumari, M Singh, R Singh, H Tewari Computer Networks 217, 109327, 2022 | 26 | 2022 |
Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices S Kumari, M Singh, R Singh, H Tewari Knowledge-Based Systems 253, 109543, 2022 | 17 | 2022 |
To secure the communication in powerful internet of things using innovative post-quantum cryptographic method S Kumari, M Singh, R Singh, H Tewari Arabian Journal for Science and Engineering 47 (2), 2419-2434, 2022 | 13 | 2022 |
Secure and decentralized crowdfunding mechanism based on blockchain technology S Kumari, K Parmar Proceedings of the International Conference on Paradigms of Computing …, 2021 | 8 | 2021 |
Post quantum digital signature change in iota to reduce latency in internet of vehicles (iov) environments N Verma, S Kumari, P Jain 2022 International Conference on IoT and Blockchain Technology (ICIBT), 1-6, 2022 | 5 | 2022 |
Interplay of nonlocality and incompatibility breaking qubit channels S Kumari, J Naikoo, S Ghosh, AK Pan Physical Review A 107 (2), 022201, 2023 | 4 | 2023 |
Enhancing the quantum communication channel using a novel quantum binary salt blowfish strategy S Kumari Wireless Personal Communications 123 (2), 1085-1102, 2022 | 3 | 2022 |
Cyber Security on the Edge: Efficient Enabling of Machine Learning on IoT Devices S Kumari, V Tulshyan, H Tewari Information 15 (3), 126, 2024 | 2 | 2024 |
Encryption And Decryption Techniques: A Review S Kumari Int. Res. J. Eng. Technol. 3 (09), 353-358, 2016 | 2 | 2016 |
A privacy-preserved horizontal federated learning for malignant glioma tumour detection using distributed data-silos S Sharma, K Guleria, A Dogra, D Gupta, S Juneja, S Kumari, A Nauman PloS one 20 (2), e0316543, 2025 | | 2025 |
Charting the Future of Fintech: Unveiling Finoracle through an In-depth Comparison of LLAMA 2, FLAN, and GPT-3.5 S Kumari, J Mahajan, P Jain, L Panikulangara, S Kulkarni, A Saxena 2024 International Conference on Trends in Quantum Computing and Emerging …, 2024 | | 2024 |
A Novel Methodology for Securing the Data using Three Stage Quantum Cryptography Algorithm S Kumari, A Tiwari International Journal of Engineering and Management Research (IJEMR) 6 (1 …, 2016 | | 2016 |
A Novel Methodology for Security and Privacy Protection Issues of Data in Cloud Computing S Kumari, A Verma International Journal of Engineering and Management Research (IJEMR) 6 (1 …, 2016 | | 2016 |
Distributed Algorithms for Joint Routing, Scheduling, Rate and Power Control in Multi-Hop Wireless Sensor Networks NPT Swati Kumari, Anup Tiwari, Samir Kumar Pandey IJERT 3 (02), 92-98, 2014 | | 2014 |
Development of Distributed E-Healthcare System Using Service Oriented Architecture S Maurya, S Kumari Advances in Computer Science and Information Technology (ACSIT), 221, 2014 | | 2014 |
Post Quantum Cryptography Based Improved Security Mechanism for Resource Constrained IoT Devices S Kumari Patiala, 0 | | |
Robotic Technology: A Pledge for Future Generation Technology S Kumari, LK Pathak, PP Satpathy, R Singh | | |
Probabilistic Stochastic Graphical Models With Improved Techniques S Kumari, A Verma | | |