An enhanced quantum key distribution protocol for security authentication

A Kumar, P Dadheech, V Singh, L Raja… - Journal of Discrete …, 2019 - Taylor & Francis
Quantum Cryptography is revolutionary discovery in the field of network security. Quantum
cryptography promises to provide sophisticated functionality for security issues but it also …

An improved quantum key distribution protocol for verification

A Kumar, P Dadheech, V Singh… - Journal of Discrete …, 2019 - Taylor & Francis
Facts say that practical cryptographic systems are now within the range. Quantum
cryptography generally gives the solution which uses the various methods of polarization to …

An enhanced energy efficient routing protocol for VANET using special cross over in genetic algorithm

A Kumar, P Dadheech, R Kumari… - Journal of Statistics and …, 2019 - Taylor & Francis
Wireless networks are gaining popularity now a days. A Vehicular Ad-hoc network that is
able to configure all network devices, which means all devices work as host and as a router …

Design and development of new framework for detection and mitigation of wormhole and black hole attacks in VANET

A Kumar, M Sinha - Journal of Statistics and Management Systems, 2019 - Taylor & Francis
VANET is the future of network technology. Due to its characteristics it does possess threats
and one of those threats is its safety. The issues of safety in VANET are discussed several …

An enhanced 4-way technique using cookies for robust authentication process in wireless network

P Dadheech, A Kumar, C Choudhary… - Journal of Statistics …, 2019 - Taylor & Francis
Abstract In Wireless Local Area Network (WLAN) IEEE802. 11, during the connection
establishment four way handshake approaches is used for authentication. 4-way handshake …

COVID-19 pandemic & cyber security issues: Sentiment analysis and topic modeling approach

S Khandelwal, A Chaudhary - Journal of Discrete Mathematical …, 2022 - Taylor & Francis
The purpose of this study is to understand public awareness of cybersecurity-related issues
and discussions during the COVID-19 pandemic. Employees and confidential organizational …

Multiple watermarking scheme for video & image for authentication & copyright protection

N Janu, A Kumar, P Dadheech, G Sharma… - IOP conference …, 2021 - iopscience.iop.org
Watermarking has been used frequently to authenticate the accuracy and security of the
image and video files. In the world of computer technology, several watermarking strategies …

A fuzzy logic-based control system for detection and mitigation of blackhole attack in vehicular ad hoc network

A Kumar, P Dadheech, MK Beniwal, B Agarwal… - Microservices in Big …, 2019 - Springer
Vehicular ad hoc network enables the vehicle in the network to establish a connection when
they required to communicate with the other vehicle in the network. These networks are the …

A neural network-based approach for pest detection and control in modern agriculture using internet of things

P Dadheech, A Kumar, V Singh, L Raja… - … services using deep …, 2021 - igi-global.com
The networks acquire an altered move towards the difficulty solving skills rather than that of
conventional computers. Artificial neural networks are comparatively crude electronic …

Weather forecasting using parallel and distributed analytics approaches on big data clouds

M Alam, M Amjad - Journal of Statistics and Management Systems, 2019 - Taylor & Francis
In cloud environment, big data analytics is a very innovative idea; in this paper we have
design architecture for parallel and distributed analysis of big data in cloud environment. We …