Følg
Dr Santosh K Pandey
Dr Santosh K Pandey
Department of Electronics and IT, Ministry of Communications and IT, Govt. of India
Ingen verifisert e-postadresse
Tittel
Sitert av
Sitert av
År
A comparative study of cloud security ontologies
V Singh, SK Pandey
Proceedings of 3rd International Conference on Reliability, Infocom …, 2014
1182014
Revisiting requirements elicitation techniques
S Sharma, SK Pandey
International Journal of Computer Applications 75 (12), 2013
1062013
Requirements elicitation: Issues and challenges
S Sharma, SK Pandey
2014 international conference on computing for sustainable global …, 2014
712014
Software security rules, SDLC perspective
C Banerjee, SK Pandey
arXiv preprint arXiv:0911.0494, 2009
512009
A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem
V Kumar, R Kumar, SK Pandey
Journal of King Saud University-Computer and Information Sciences 32 (9 …, 2020
452020
Recent advances in sugarcane genomics, physiology, and phenomics for superior agronomic traits
MR Meena, C Appunu, R Arun Kumar, R Manimekalai, S Vasantha, ...
Frontiers in Genetics 13, 854936, 2022
422022
A comparative study of risk assessment methodologies for information systems
SK Pandey
Bulletin of Electrical Engineering and Informatics 1 (2), 111-122, 2012
422012
Research on software security awareness: problems and prospects
C Banerjee, SK Pandey
ACM SIGSOFT Software Engineering Notes 35 (5), 1-5, 2010
312010
Formal methods in requirements phase of SDLC
SK Pandey, M Batra
International Journal of Computer Applications 70 (13), 2013
292013
Revisiting security ontologies
V Singh, SK Pandey
International Journal of Computer Science Issues (IJCSI) 11 (6), 150, 2014
262014
Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups
V Kumar, R Kumar, SK Pandey
International Journal of Information Technology 12 (1), 283-288, 2020
232020
Fully homomorphic encryption scheme with probabilistic encryption based on Euler’s theorem and application in cloud computing
V Kumar, R Kumar, SK Pandey, M Alam
Big Data Analytics: Proceedings of CSI 2015, 605-611, 2018
202018
Research in cloud security: problems and prospects
V Singh, SK Pandey
International Journal of Computer Science Engineering and Information …, 2013
192013
Revisiting cloud security issues and challenges
V Singh, SK Pandey
International Journal of Advanced Research in Computer Science and Software …, 2013
192013
Integrating AI techniques in requirements phase: a literature review
S Sharma, SK Pandey
IJCA Proceedings on 4th International IT Summit Confluence, 21-25, 2013
182013
LKM-AMI: a lightweight key management scheme for secure two way communications between smart meters and HAN devices of AMI system in smart grid
V Kumar, R Kumar, SK Pandey
Peer-to-Peer Networking and Applications 14 (1), 82-100, 2021
172021
A secure and robust group key distribution and authentication protocol with efficient rekey mechanism for dynamic access control in secure group communications
V Kumar, R Kumar, SK Pandey
International Journal of Communication Systems 33 (14), e4465, 2020
172020
Cloud security related threats
V Singh, SK Pandey
International Journal of Scientific & Engineering Research 4 (9), 2571, 2013
162013
Sharma
SK Pandey
Libraries and Society” ESS ESS Publication, New Delhi, 1992
161992
Revisiting cloud security threats: Replay attack
V Singh, SK Pandey
2018 4th International Conference on Computing Communication and Automation …, 2018
152018
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20