A comparative survey of symmetric and asymmetric key cryptography S Chandra, S Paira, SS Alam, G Sanyal 2014 international conference on electronics, communication and …, 2014 | 272 | 2014 |
A study and analysis on symmetric cryptography S Chandra, S Bhattacharyya, S Paira, SS Alam 2014 International Conference on Science Engineering and Management Research …, 2014 | 58 | 2014 |
Content based double encryption algorithm using symmetric key cryptography S Chandra, B Mandal, SS Alam, S Bhattacharyya Procedia Computer Science 57, 1228-1234, 2015 | 48 | 2015 |
Sentiment analysis for product review N Sultana, P Kumar, M Patra, S Chandra, S Alam ICTACT J Soft Comput 9 (03), 2019 | 30 | 2019 |
A brief study and analysis of different searching algorithms N Sultana, S Paira, S Chandra, SS Alam 2017 second international conference on electrical, computer and …, 2017 | 26 | 2017 |
A comparative and analytical study on symmetric key cryptography B Mandal, S Chandra, SS Alam, SS Patra 2014 international conference on electronics, communication and …, 2014 | 24 | 2014 |
Enhanced Merge Sort-a new approach to the merging process S Paira, S Chandra, SKS Alam Procedia Computer Science 93, 982-987, 2016 | 16 | 2016 |
A review report on divide and conquer sorting algorithm S Paira, S Chandra, SS Alam, PS Dey IEEE Kolkata Section, 978-993, 2014 | 11 | 2014 |
Doubly inserted sort: a partially insertion based dual scanned sorting algorithm S Paira, A Agarwal, SS Alam, S Chandra Emerging Research in Computing, Information, Communication and Applications …, 2015 | 10 | 2015 |
A novel image encryption algorithm using hyper-chaos key sequences, multi step group based binary gray conversion and circular bit shifting logic SS Alam, S Bhattacharyya, S Chandra 2014 International Conference on Science Engineering and Management Research …, 2014 | 8 | 2014 |
Max min sorting algorithm—a new approach of sorting S Paira, S Chandra, SS Alam, SS Patra Int. J. Technol. Explor. Learn.(IJTEL) 3 (2), 405-408, 2014 | 5 | 2014 |
Secure cryptographic algorithm using digital logic B Mandal, S Chandra, S Safikul Alam Emerging Research in Computing, Information, Communication and Applications …, 2016 | 4 | 2016 |
Agile software development: Novel approaches for software engineering SS Alam, S Chandra Int. J. Eng. Sci.(IJES) 3 (1), 36-40, 2014 | 4 | 2014 |
Secure transmission of data using image steganography S Chandra, S Paira ICTACT Journal on Image and Video Processing, August 2019 10 (01), 2019 | 3 | 2019 |
Symmetric key encryption through data structure and binary-gray conversion S Paira, S Chandra, SS Alam, S Bhattacharyya Emerging Research in Computing, Information, Communication and Applications …, 2015 | 3 | 2015 |
Automated Damaged Ginkgo Leaf Detection. SS Alam, S Chandra, D Samanta | 3 | 2014 |
Audio cryptanalysis-An application of symmetric key cryptography and audio steganography S Paira, S Chandra ICTACT Journal on Communication Technology 7 (3), 1345-1350, 2016 | 2 | 2016 |
A Rotation Based Encryption Technique Using Symmetric Key Method S Chandra, S Paira, SS Alam, S Bhattacharyya Emerging Research in Computing, Information, Communication and Applications …, 2015 | 2 | 2015 |
Bi linear search a new session of searching S Paira, S Chandra, SS Alam, SS Patra International Journal 4 (3), 2014 | 2 | 2014 |
A study and Analysis on Symmetric Cryptography C Sourabh, B Siddhartha, S Paira Institute of Electrical and Electronics Engineers, Piscataway, New Jersey. p1-8, 2014 | 2 | 2014 |