Strengthening elliptic curve cryptography—key generation via biometric fusion approach YS Pagar, GV Chowdhary Computing in Engineering and Technology: Proceedings of ICCET 2019, 87-101, 2020 | 18 | 2020 |
Web personalization using web mining techniques YS Pagar, VR Mote, SB Rahul Emerging Trends in Computer Science and Information Techno12012 (ETCSIT2012), 2012 | 18 | 2012 |
Cloud computing, risks and rewards RS Bramhane, VR Mote, SP Yogita World Journal of Science and Technology 2, 2012 | 18 | 2012 |
Load balancing of fog computing centre and its security using elliptic curve cryptography Y Pagar, D Rathod, G Chowdhary International Journal of Autonomic Computing 3 (3-4), 245-260, 2020 | 15 | 2020 |
Computing in Engineering and Technology: Proceedings of ICCET 2019 B Iyer, PS Deshpande, SC Sharma, U Shiurkar Springer Nature, 2019 | 2 | 2019 |
Vishakha YS Pagar R. Mote, Rahul S. Bramhane,―Web Personalization using Web Mining Techniques …, 0 | 2 | |
Authenticated Voice Assistant for Desktop Applications KS Dr. Yogita Bhise, Evangeline Rebello, Ruchika Kahane, Samruddhi Badgujar International Journal of creative research and thoughts 11 (4), 585-588, 2023 | | 2023 |
SIGN LANGUAGE TRANSALTION USING KINECT SENSOR Dr. Prof. Y.D. Bhise, Salas Shah, Shivam Gaikwad, Vaishnavi Deshmane ... International Journal of creative research and thoughts 11 (4), 926-931, 2023 | | 2023 |
Data Mining Application In Effective Knowledge Management: An Empirical Study DSM Dr. Roopa Shettigar,Dr. Yogita D. Bhise,Dr Bapurao Bandgar IJFANS International Journal of Food and Nutritional Sciences 11 (3), 2022, 2022 | | 2022 |
Factors Determining The Quality Management In Supply Chain Management: An Empirical Study Logistics RS Dr. M. Deva Kumar,Dr. Yogita D. Bhise,Niranchana Shri Viswanathan IJFANS International Journal of Food and Nutritional Sciences 11 (3), 1333-1343, 2022 | | 2022 |
Location & Recommendation Aware News with Diversity for Mobile user VM Gaikwad, YS Pagar | | 2017 |
Application of Elliptical curve cryptography CSP Y.S. Pagar International Journal of Computer Science and Information Technology 6 (1), 2015 | | 2015 |
Intrusion Detection & Prevention System with Rule Based Mining Techniques DCB Y.S. Pagar, C.S . Pagar 7th International Conference on Advance Computing and communication Technologies, 2013 | | 2013 |
Web-Solution- Efficient I-Solution for Educational Institution RSB Y S Pagar, V.R. Mote Recent Trends in Computer Application edited by- Abhijeet Shelke and Vikas …, 2010 | | 2010 |
Cryptography using elliptic curve- multiplication issue YS Pagar International conference on Advanced Computing Technologies: ICACT 2008 …, 2008 | | 2008 |
Importance of Montgomery Algorithm in ECC PSR Y.S. Pagar National Conference in Information & communication Technology, 2008 | | 2008 |
Steganography- a way to hide Information RSB Y.S. Pagar National Conference on Information Security MERG-07, 2007 | | 2007 |
Data Mining YS Pagar National Conference in Revolutionary Trends in Electronics and Information …, 2006 | | 2006 |
Elliptic Curve Cryptography Over Prime Field MYS Pagar, MCM Gaikwad | | |