Design of cloud security in the EHR for Indian healthcare services P Deshmukh Journal of King Saud university-computer and information sciences 29 (3 …, 2017 | 62 | 2017 |
To detect and track moving object for surveillance system MM Bhajibhakare, PK Deshmukh International Journal of Innovative Research in Computer and Communication …, 2013 | 16 | 2013 |
Ensuring the data integrity and confidentiality in cloud storage using hash function and TPA SV Tikore, KD Pradeep, BD Prakash International Journal on Recent and Innovation Trends in Computing and …, 2015 | 10 | 2015 |
Feature based approach for review mining using appraisal words DD Chaudhari, RA Deshmukh, AB Bagwan, PK Deshmukh 2013 International Conference on Emerging Trends in Communication, Control …, 2013 | 10 | 2013 |
Firewall policy anomaly management with optimizing rule order SS Kachare, P Deshmukh International Journal of Application or Innovation in Engineering …, 2015 | 7 | 2015 |
Detection and tracking of moving object for surveillance system MM Bhajibhakare, PK Deshmukh International Journal of Application of Innovation in Engineering and …, 2013 | 6 | 2013 |
Provide security for broker-less content based publish system using pairing based cryptography VD Malpure, PK Deshmukh INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH 4 (2), 1932 …, 2016 | 5 | 2016 |
Speech oriented computer system handling AJ Kadam, P Deshmukh, A Kamat, N Joshi, R Doshi International Conference On Intelligent Computational Systems (ICICS’2012), 2012 | 5 | 2012 |
Generating: random regions in Spatial cloaking algorithm for location privacy preservation SR Shastry, PK Deshmukh, AB Bagwan IOSR Journal of Computer Engineering, IOSR-JCE 9, 46-49, 2013 | 3 | 2013 |
Efficient object tracking using K means and radial basis function PK Deshmukh, Y Gholap 2012 12th International Conference on Hybrid Intelligent Systems (HIS), 52-56, 2012 | 3 | 2012 |
Improving Network Performance by Differentiating DDoS Attacks from Flash Crowds KH Patil, A Bagwan, P Deshmukh Int. J. Adv. Res. Comput. Sci. Manag. Stud. 3 (1), 2015 | 2 | 2015 |
Attribute based secure query processing in cloud with privacy homomorphism MRS Khachane, PK Deshmukh Int. J. Comput. Netw. Commun. Secur. 3, 291-297, 2015 | 2 | 2015 |
Multi Client Support Third Party Auditor (TPA) for Cloud Data Integrity and Security MVR Desale, PK Deshmukh International Journal3 6, 2013 | 2 | 2013 |
In-vitro antimicrobial activity of essential oil of newly evolved Eucalyptus hybrid FRI-5. DC Chaudhari, CL Goel, RK Suri, PK Deshmukh | 2 | 1989 |
A Review on Distributed File System in Hadoop A Kadam, P Deshmukh, PB Dhainje International Journal of Engineering Research & Technology 4 (05), 2015 | 1 | 2015 |
Survey On Techniques for data integrity verification in cloud storage MPM Karandikar, PK Deshmukh IOSR Journal of Computer Engineering (IOSR-JCE) 1, 65-67, 2015 | 1 | 2015 |
Public Cryptography Linear and Non Linear Programming Solver in Cloud Computing SA Phatangare, RA Deshmukh, PK Deshmukh International Journal of Application or Innovation in Engineering …, 2013 | 1 | 2013 |
Rule Order Optimization For Packet Filtering Firewall AB Bagwan, PK Deshmukh, PM Choudhari International Journal of Scientific Engineering Research 4 (8), 1308-1311, 2013 | 1 | 2013 |
Key-Aggregate Searchble Encryption (KASE) for Group Data Sharing S Mujawar, PK Deshmukh INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH 4 (2), 2208 …, 2016 | | 2016 |
Data Truthfulness in Cloud by Regeneration Code Based Public Auditing PK Deshmukh INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH 4 (2), 1871 …, 2016 | | 2016 |