Seguir
Dr. Raman Kumar
Dr. Raman Kumar
I.K. Gujral Punjab Technical University
Email confirmado em ptu.ac.in
Título
Citado por
Citado por
Ano
Hybrid Homomorphic Encryption Scheme for Secure Cloud Data Storage
B Seth, S Dalal, R Kumar
Recent Advances in Computational Intelligence, 71-92, 2019
482019
Robustness of Digital Image Watermarking Techniques against brightness and rotation attacks
H Verma, A Singh, R Kumar
IJCSIS) International Journal of Computer Science and Information Security, 2009
422009
Securing Bioinformatics Cloud for Big Data: Budding Buzzword or a Glance of the Future
B Seth, S Dalal, R Kumar
Recent Advances in Computational Intelligence, 121-147, 2019
322019
Blocking of sql injection attacks by comparing static and dynamic queries
J Minhas, R Kumar
IJ Computer Network and Information Security 2, 1-9, 2013
242013
Analysis and design of protocol for enhanced threshold proxy signature scheme based on RSA for known signers
R Kumar, HK Verma, R Dhir
Wireless Personal Communications 80, 1281-1345, 2015
182015
Cryptanalysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers
R Kumar, HK Verma, R Dhir
Mathematical Problems in Engineering 2013, 2013
172013
Security analysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers
R Kumar, HK Verma, R Dhir
International Journal of Computer Network and Information Security 4 (9), 63, 2012
172012
International Journal of Computer Network and Information Security (IJCNIS)
J Minhas, R Kumar
16*
An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for known Signers
R Kumar, HK Verma
IEEE 2nd International Advance Computing Conference, TU, India, 2010
152010
A Literature Survey on various Image Encryption & Steganography Techniques
M Dahiya, R Kumar
2018 First International Conference on Secure Cyber Computing and …, 2018
122018
Comparison of Threshold Proxy Signature Schemes.
HK Verma, K Kaur, R Kumar
Security and Management, 227-231, 2008
112008
A hybrid feature extraction technique for content based medical image retrieval using segmentation and clustering techniques
Madhu, R Kumar
Multimedia Tools Applications, 1380-7501, 2022
102022
Design of a Low-Cost Sensor-Based IOT System for Smart Irrigation
K Singh, R Kumar
Applications in Ubiquitous Computing, 59-79, 2021
102021
Secure threshold proxy signature scheme based on RSA for known signers
R Kumar, HK Verma
Journal of Information Assurance and Security, USA 5 (4), 319-326, 2010
102010
Random sample audio watermarking algorithm for compressed wave files
H Verma, R Kaur, R Kumar
International Journal of Computer Science and Network Security 9 (11), 283-287, 2009
102009
Cryptanalysis of Protocol for Enhanced Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography for Known Signers
R Kumar
In: Margret Anouncia S., Wiil U. (eds) Knowledge Computing and Its …, 2018
92018
The obligatory of an Algorithm for Matching and Predicting Crime - Using Data Mining Techniques
A Sharma, R Kumar
International Journal of Computer Science and Technology, IJCST 4 (2), 289-292, 2013
92013
Information Technology Empowers by Women
R Kumar, R Kochher
International Journal of Science and Emerging Trends with latest Trends …, 2011
92011
Information Technology Empowers by Women
R Kumar, R Kochher
International Journal for Science and Emerging Technologies with Latest …, 2011
92011
Machine Learning for Malware Detection on Balanced and Imbalanced Datasets
M Goyal, R Kumar
2020 International Conference on Decision Aid Sciences and Application (DASA …, 2020
82020
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20