Search Results - "Verma, Pramode"
-
1
A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System
Published in Security and communication networks (01-01-2017)“…This paper presents a comparative evaluation of possible encryption algorithms for use in a self-contained, ultra-secure router-to-router communication system,…”
Get full text
Journal Article -
2
Multi-stage quantum secure communication using polarization hopping
Published in Security and communication networks (01-12-2015)“…This paper proposes a generalized multi‐stage multi‐photon protocol that uses arbitrary polarization states to securely communicate between a sender and a…”
Get full text
Journal Article -
3
Pricing of public infrastructure services
Published in The journal of critical infrastructure policy (19-11-2024)Get full text
Journal Article -
4
Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks
Published in Security and communication networks (01-11-2009)“…Optical burst switching (OBS) is the most promising optical switching technology for the future Internet, but it suffers from security vulnerabilities. In this…”
Get full text
Journal Article -
5
An IEEE 802.11 quantum handshake using the three-stage protocol
Published in 2014 23rd International Conference on Computer Communication and Networks (ICCCN) (01-08-2014)“…This paper presents a model of integration of the Three-stage quantum cryptography protocol and its variants into the IEEE 802.11 wireless communication…”
Get full text
Conference Proceeding -
6
Maximize Producer Rewards in Distributed Windmill Environments: A Q-Learning Approach
Published in AIMS energy (01-01-2015)“…In Smart Grid environments, homes equipped with windmills are encouraged to generate energy and sell it back to utilities. Time of Use pricing and the…”
Get full text
Journal Article -
7
Pricing multi-class network services using the Shapley Value
Published in Netnomics (01-04-2011)“…This paper investigates pricing issues in class-based networks. Classes of packets having lower impatience and longer average delay receive monetary…”
Get full text
Journal Article -
8
A unified security framework for WiMAX over EPON access networks
Published in Security and communication networks (01-06-2011)“…Passive optical networks (PONs) offer a popular broadband access solution allowing for high bandwidth and long transmission range to meet user fast evolving…”
Get full text
Journal Article -
9
Fast convergent key distribution algorithms using a dual quantum channel
Published in Security and communication networks (01-11-2009)“…This paper presents three new algorithms over a dual quantum channel to enhance the convergence speed of the key distribution process. The proposed algorithms…”
Get full text
Journal Article -
10
The natural impact of artificial intelligence
Published in International journal of critical infrastructure protection (01-09-2018)Get full text
Journal Article -
11
Refined assured forwarding framework for differentiated services architecture
Published in Computer communications (10-12-2007)“…This paper presents a new refined assured forwarding (RAF) framework for improving the performance of DiffServ architecture where heterogeneous traffic flows…”
Get full text
Journal Article -
12
Unconditional security through quantum uncertainty
Published in International journal of critical infrastructure protection (01-03-2017)Get full text
Journal Article -
13
Limits on the traffic carrying capacity of optical networks with an arbitrary topology
Published in IEEE communications letters (01-10-2004)“…The letter examines the limits on the traffic carrying capacity of a dense wavelength-division multiplexing (DWDM)-based network of arbitrary topology. It also…”
Get full text
Journal Article -
14
A Video Super-Resolution Framework Using SCoBeP
Published in IEEE transactions on circuits and systems for video technology (01-02-2016)“…Super-resolution as an exciting application in image processing was studied widely in the literature. This paper presents new approaches to video…”
Get full text
Journal Article -
15
The role of the network in implementing security and privacy
Published in International journal of critical infrastructure protection (01-03-2013)Get full text
Journal Article -
16
The elusive goal of net neutrality
Published in International journal of critical infrastructure protection (01-12-2011)Get full text
Journal Article -
17
Improving the efficiency of entanglement based quantum key exchange
Published in 2014 23rd International Conference on Computer Communication and Networks (ICCCN) (01-08-2014)“…This article presents two efficient cryptographic protocols, based on quantum entanglement, for secure exchange of secret keys. While the first protocol…”
Get full text
Conference Proceeding -
18
Gateway Placement in Backbone Wireless Mesh Networks Using Directional Antennas
Published in 2011 Ninth Annual Communication Networks and Services Research Conference (01-05-2011)“…This paper investigates gateway placement problem in backbone wireless mesh networks using directional antenna systems. A heuristic gateway placement algorithm…”
Get full text
Conference Proceeding -
19
SCoBeP: Dense image registration using sparse coding and belief propagation
Published in Journal of visual communication and image representation (01-02-2013)“…[Display omitted] ► SCoBeP is a novel dense image registration method. ► The proposed method relies on sparse coding and belief propagation. ► SCoBeP provides…”
Get full text
Journal Article -
20
George Orwell’s Nineteen Eighty-Four — A retrospective and prospective twenty-five years later
Published in International journal of critical infrastructure protection (01-10-2009)Get full text
Journal Article