Volgen
Umashankar Rawat
Umashankar Rawat
Manipal University Jaipur
Geverifieerd e-mailadres voor jaipur.manipal.edu
Titel
Geciteerd door
Geciteerd door
Jaar
Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map
M Kaur, D Singh, K Sun, U Rawat
Future Generation Computer Systems 107, 333-350, 2020
1302020
Image forgery detection using singular value decomposition with some attacks
NK Rathore, NK Jain, PK Shukla, US Rawat, R Dubey
National Academy Science Letters 44 (4), 331-338, 2021
902021
A lightweight cellular automata based encryption technique for IoT applications
S Roy, U Rawat, J Karjee
IEEE Access 7, 39782-39793, 2019
502019
Lightweight solutions to counter DDoS attacks in software defined networking
M Conti, C Lal, R Mohammadi, U Rawat
Wireless Networks 25, 2751-2768, 2019
452019
IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata
S Roy, M Shrivastava, CV Pandey, SK Nayak, U Rawat
Multimedia Tools and Applications 80, 31529-31567, 2021
442021
Symmetric key encryption technique: a cellular automata based approach in wireless sensor networks
S Roy, J Karjee, US Rawat, N Dey
Procedia Computer Science 78, 408-414, 2016
432016
IECA: an efficient IoT friendly image encryption technique using programmable cellular automata
S Roy, U Rawat, HA Sareen, SK Nayak
Journal of Ambient Intelligence and Humanized Computing 11, 5083-5102, 2020
412020
IEHC: An efficient image encryption technique using hybrid chaotic map
K Kumar, S Roy, U Rawat, S Malhotra
Chaos, Solitons & Fractals 158, 111994, 2022
362022
IESCA: An efficient image encryption scheme using 2-D cellular automata
S Roy, M Shrivastava, U Rawat, CV Pandey, SK Nayak
Journal of Information Security and Applications 61, 102919, 2021
312021
Distributed biomedical scheme for controlled recovery of medical encrypted images
D Pandey, U Rawat, NK Rathore, K Pandey, PK Shukla
IRBM 43 (3), 151-160, 2022
162022
Efficient hybrid load balancing algorithm
NK Rathore, U Rawat, SC Kulhari
National Academy Science Letters 43 (2), 177-185, 2020
142020
Symmetric key encryption technique: A cellular automata based approach
D Parashar, S Roy, N Dey, V Jain, US Rawat
Cyber Security: Proceedings of CSI 2015, 59-67, 2018
142018
Robust progressive block based visual cryptography with chaotic map
D Pandey, US Rawat, A Kumar
Journal of Discrete Mathematical Sciences and Cryptography 19 (5-6), 1025-1040, 2016
142016
A comprehensive review of android security: Threats, vulnerabilities, malware detection, and analysis
S Acharya, U Rawat, R Bhatnagar
Security and Communication Networks 2022, 2022
132022
Secure vertical handover to NEMO using hybrid cryptosystem
VR Reddicherla, U Rawat, YJN Kumar, A Zaguia
Security and Communication Networks 2021, 1-12, 2021
92021
Secure Vertical Handover to NEMO using Hybrid Cryptosystem
A Zaguia, V Raju, YJN Kumar, U Rawat
Hindawi, Article ID 6751423, 0
9
A low computational cost method for mobile malware detection using transfer learning and familial classification using topic modelling
S Acharya, U Rawat, R Bhatnagar
Applied Computational Intelligence and Soft Computing 2022, 1-22, 2022
62022
A novel cryptosystem using cellular automata
S Roy, N Bhatia, US Rawat
2017 International Conference on Communication and Signal Processing (ICCSP …, 2017
62017
Chaotic Map for Securing Digital Content: A Progressive Visual Cryptography Approach
D Pandey, U Rawat
International Journal of Rough Sets and Data Analysis 3 (1), 21-36, 2016
62016
ECFS: An enterprise-class cryptographic file system for linux
US Rawat, S Kumar
International Journal of Information Security and Privacy (IJISP) 6 (2), 53-63, 2012
52012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20