Search Results - "V, Panchami"
-
1
A Substitution Box for Lightweight Ciphers to Secure Internet of Things
Published in Journal of King Saud University. Computer and information sciences (01-04-2023)“…The Internet of Things is a resource-constrained device that demands lightweight cryptographic solutions to achieve high performance and optimal security. In…”
Get full text
Journal Article -
2
Quantum Cryptanalysis of Affine Cipher
Published in IEEE journal on emerging and selected topics in circuits and systems (01-09-2024)“…Quantum Algorithms reduce the computational complexity or solve certain difficult problems that were originally impossible to solve with classical computers…”
Get full text
Journal Article -
3
QS-Auth: A Quantum-secure mutual authentication protocol based on PUF and Post-Quantum Signature for Heterogeneous Delay-Tolerant Networks
Published in Journal of information security and applications (01-06-2024)“…Delay tolerant networks supporting heterogeneous communication are a promising network architecture solution that can meet today’s communication requirements…”
Get full text
Journal Article -
4
-
5
A Blockchain-assisted lightweight privacy preserving authentication protocol for peer-to-peer communication in vehicular ad-hoc network
Published in Peer-to-peer networking and applications (01-11-2024)“…Vehicular Ad-Hoc Network (VANET), provides considerable real-time traffic information services that enhance safety and traffic effectiveness. However, as most…”
Get full text
Journal Article -
6
Dynamic colour table: A novel S‐box for cryptographic applications
Published in International journal of communication systems (10-11-2017)“…Summary In cryptography, S‐boxes play an important role in symmetric ciphers. S‐boxes are used for substitution process to enable diffusion in encryption and…”
Get full text
Journal Article -
7
An integrative analysis to identify pancancer epigenetic biomarkers
Published in Computational biology and chemistry (01-12-2024)“…Integrating and analyzing the pancancer data collected from different experiments is crucial for gaining insights into the common mechanisms in the molecular…”
Get full text
Journal Article -
8
Frequency Analysis Attack on Ceaser Cipher using Quantum Support Vector Machine
Published in 2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI) (21-12-2022)“…Quantum technology accelerated computing may have the capacity to provide solutions that are much better compared to their best known classical solutions…”
Get full text
Conference Proceeding -
9
A Survey on Consensus Algorithms in Blockchain Based on Post Quantum Cryptosystems
Published in 2022 5th International Conference on Computational Intelligence and Networks (CINE) (01-12-2022)“…Blockchain is a distributed, decentralized ledger mechanism with a various features. It is used in diverse applications nowadays, from financial sector to…”
Get full text
Conference Proceeding -
10
Effect of Combining Nano- and Microfillers for the Assessment of Thermal Class of Glass Fiber-Reinforced Epoxy Composites for Outdoor Insulation
Published in IEEE transactions on dielectrics and electrical insulation (01-12-2023)“…The present work was taken up with the objective to develop a compact and reliable hybrid composite insulation, investigate the thermal properties of the…”
Get full text
Journal Article -
11
A Novel Multiplicative Substitution Cryptosystem
Published in 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT) (01-02-2019)“…A cryptosystem primarily used for data encryption and data security. Nowadays the misuse of confidential information by unauthorized parties became a very big…”
Get full text
Conference Proceeding -
12
Bladder Cancer Prediction Using Genetic Algorithm and Fuzzy Rule-Based System
Published in 2021 International Conference on Communication, Control and Information Sciences (ICCISc) (16-06-2021)“…The aberrations in the DNA Methylation levels are known cause diseases like Cancer by regulating the gene expression. The effect of DNA Methylation in Bladder…”
Get full text
Conference Proceeding -
13
Real-time Scene Change Detection with Object Detection for Automated Stock Verification
Published in 2020 5th International Conference on Devices, Circuits and Systems (ICDCS) (01-03-2020)“…Automation is a process of utilizing technology to reduce human efforts. In this paper, we propose a computer vision-based automated system for stock…”
Get full text
Conference Proceeding -
14
A novel approach for predicting the length of hospital stay with DBSCAN and supervised classification algorithms
Published in The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014) (01-02-2014)“…Patient length of stay is the most commonly employed outcome measure for hospital resource consumption and to monitor the performance of the hospital…”
Get full text
Conference Proceeding -
15
A Review on Federated Learning with a Focus on Security and Privacy
Published in 2024 IEEE Recent Advances in Intelligent Computational Systems (RAICS) (16-05-2024)“…Federated Learning (FL) enables the collaborative training of a global model without centralizing data, effectively addressing privacy concerns in the field of…”
Get full text
Conference Proceeding -
16
"The effect of combining nano and micro fillers for the assessment of thermal class of glass fiber reinforced epoxy composites for outdoor insulation"
Published in IEEE transactions on dielectrics and electrical insulation (12-06-2023)“…The present work was taken up with the objective to develop a compact and reliable hybrid composite insulation, investigate the thermal properties of the…”
Get full text
Journal Article -
17
Design of Low Power and Robust Asynchronous SRAM Generated Using AMC Involving SAHB Circuit with QDI Logic
Published in Journal of the Institution of Engineers (India). Series B, Electrical Engineering, Electronics and telecommunication engineering, Computer engineering (2024)“…In the contemporary era, achieving enhanced performance in application-specific integrated circuit (ASIC) designs necessitates the development of memory…”
Get full text
Journal Article -
18
BISC authentication algorithm: An efficient new authentication algorithm using three factor authentication for mobile banking
Published in 2016 Online International Conference on Green Engineering and Technologies (IC-GET) (01-11-2016)“…Mobile banking, is a hottest topic in the development of banking sector which is expected to be replaced by online or net banking in the near future. Mobile…”
Get full text
Conference Proceeding -
19
An encryption protocol for end-to-end secure transmission of SMS
Published in 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015] (01-03-2015)“…Short Message Service (SMS) is a process of transmission of short messages over the network. SMS is used in daily life applications including mobile commerce,…”
Get full text
Conference Proceeding -
20
Date time keyed - HMAC
Published in 2016 Online International Conference on Green Engineering and Technologies (IC-GET) (01-11-2016)“…Data integrity and Data Origin Integrity is major factor that develops or measures the trust between the communicators in any sort of communication …”
Get full text
Conference Proceeding