Secure visual secret sharing scheme for color images using visual cryptography and digital watermarking J Saturwar, DN Chaudhari 2017 Second International Conference on Electrical, Computer and …, 2017 | 24 | 2017 |
Securing the Adhoc Network Data Using Hybrid Malicious Node Detection Approach AB Kathole, DN Chaudhari International Conference on Intelligent Vision and Computing, 447-457, 2021 | 22 | 2021 |
Pros & Cons of machine learning and security methods AB Kathole, DDN Chaudhari ISSN 21 (4), 2019 | 20 | 2019 |
Cloud computing: Infrastructure as a service AS Rumale, DN Chaudhari International Journal of Inventive Engineering and Sciences 1 (3), 1-7, 2013 | 20 | 2013 |
Ieee 802.11 x, and wep, eap, wpa/wpa2 AS Rumale, D Chaudhari Tech. Appl 2 (6), 1945-1950, 2011 | 20 | 2011 |
Secure Hybrid Approach for Sharing Data Securely in VANET A Kathole, D Chaudhari Proceeding of International Conference on Computational Science and …, 2022 | 15 | 2022 |
Fuel analysis and distance prediction using machine learning AB Kathole, DN Chaudhari Int J Future Revol Comput Sci Commun Eng 5 (6), 2019 | 15 | 2019 |
Study of content management systems Joomla and Drupal BV Wakode, DN Chaudhari IJRET: International Journal of Research in Engineering and Technology 2 (12 …, 2013 | 15 | 2013 |
Google glass S Deshpande, G Uplenchwar, DN Chaudhari International Journal of Scientific & Engineering Research 4 (12), 1-4, 2013 | 14 | 2013 |
Cloud computing: software as a service AS Rumale, DN Chaudhari 2017 Second International Conference on Electrical, Computer and …, 2017 | 12 | 2017 |
Review of models, issues and applications of digital watermarking based on visual cryptography JH Saturwar, DN Chaudhari 2017 International Conference on Inventive Systems and Control (ICISC), 1-4, 2017 | 10 | 2017 |
Security aware routing scheme in vehicular adhoc network AP Jadhao, DN Chaudhari 2018 2nd International Conference on Inventive Systems and Control (ICISC …, 2018 | 7 | 2018 |
Cloud Computing: Infrastructure as a Service S Aniruddha, D Chaudhari International Journal of Inventive Engineering and Sciences (IJIES) 1 (3), 2013 | 7 | 2013 |
Towards effective client-server based advent intrusion prevention system for WLAN SV Athawale, DN Chaudhari 2015 International Conference on Computer, Communication and Control (IC4), 1-5, 2015 | 4 | 2015 |
Deciding meaningful number of shares in digital watermarking scheme for secret images J Saturwar, DN Chaudhari 2016 International Conference on Signal Processing, Communication, Power and …, 2016 | 3 | 2016 |
Cloud Computing: Service Level Agreements (SLA) AS Rumale, DN Chaudhari INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH 4 (9), 1-5, 2013 | 3 | 2013 |
Digital watermarking scheme for secret images using visual cryptography J Saturwar, DN Chaudhari Int. J. Sci. Eng. Res 4 (6), 2013 | 3 | 2013 |
Performance Evaluation of watermarking Schemes to Decide Meaningful Number of Shares J Saturwar, DDN Chaudhari Published in International Journal of Technology & Engineering ISSN, 2455-4480, 0 | 3 | |
Optimal Number Of Shares For Digital Water-marking Scheme Using Visual Cryptography J Saturwar, DN Chaudhari International Journal For Research In Emerging Science And Technology 2, 407-412, 0 | 3 | |
A novel approach for security aware topological based routing protocol in vehicular ad hoc network AP Jadhao, DN Chaudhari Int. J. Sci. Eng. Res 14, 45-51, 2013 | 2 | 2013 |