An illustration to secured way of data mining using privacy preserving data mining R Purohit, D Bhargava Journal of Statistics and Management Systems 20 (4), 637-645, 2017 | 20 | 2017 |
A survey on recent cryptographic hash function designs R Purohit, U Mishra, A Bansal International Journal of Emerging Trends & Technology in Computer Science, 2013 | 19 | 2013 |
Comparative Analysis of Few Cloud Service Providers Considering Their Distinctive Properties. R Purohit International Journal of Advanced Research in Computer Science 8 (5), 2017 | 11 | 2017 |
Design and analysis of a new hash algorithm with key integration R Purohit, U Mishra, A Bansal International Journal of Computer Applications 975, 8887, 2013 | 10 | 2013 |
Design and Implementation of Pothole Detection & Instance Detection Based on A Unified Approach For Globally Roads M Pagale, S Mulik, R Purohit, A Thakare, S Jadhav 2023 1st International Conference on Innovations in High Speed Communication …, 2023 | 3 | 2023 |
Design and Implementation of Lane Detection Using Hough Transformation M Pagale, S Mulik, R Purohit, A Thakare, R Hanchate, S Jadhav 2023 2nd International Conference on Applied Artificial Intelligence and …, 2023 | 1 | 2023 |
Implementation of Double Encrypted MAC based on Diffie-Hellman Key Exchange for Improved integrity and Authentication R Purohit, SV Mohurle, M Patil, D Bhargava International Journal of Advanced Science and Research 3, 39-42, 2018 | 1 | 2018 |
Integrtation of Encryption and Hash Function for Improved Message Authenticity R Purohit, Y Singh, U Mishra, A Bansal International Journal of Engineering Research and Applications (IJERA) 2 …, 2012 | 1 | 2012 |
Insights of Deep Convolutional Neural Network for Traffic Sign Detection in Autonomous Vehicle M Pagale, R Purohit, P Dhade, A Thakare, S Gudadhe, P Narkhede 2023 2nd International Conference on Applied Artificial Intelligence and …, 2023 | | 2023 |
A Study on Cryptographic Hash Functions in Blockchain and Cryptocurrency HB R.Purohit Web of Science, UGC Care list-II Journal: Vidyabharati International …, 2021 | | 2021 |
A review on privacy protection in the internet of things using machine learning-based solutions M Pagale, R Purohit International Journal of Information Privacy, Security and Integrity 5 (1 …, 2021 | | 2021 |
Ring Signature: Presenting New Design with Keyed Hash Function R Purohit Proceedings of International Conference on Sustainable Computing in Science …, 2019 | | 2019 |
Designing Cloud Supported Health Services Model for Rural Areas in Maharashtra. RP V.N.Mahandule, P.Shrivastava International Journal of Research and Analytical Reviews 6 (1), 43-47, 2019 | | 2019 |
Implementation of Cloud Based Healthcare Services: Need and Challenges. RP V.N.Mahandule, J.Sheetlani International Journal of Technical Innovation in Modern Engineering …, 2018 | | 2018 |
Richa Purohit Upendra Mishra A Bansal | | 2013 |
An Illustrative Approach for Secure Key Based Authentication for Cloud Communication R Purohit | | |
Review Of ReseaRch MV Mahandule, J Sheetlani, R Purohit | | |
IMPLEMENTATION OF CLOUD BASED HEALTHCARE SERVICES: NEED AND CHALLENGES MV Mahandule, J Sheetlani, R Purohit | | |
Mechanism For Imposing E-Mail Header Security: Expectation And Solution R Purohit | | |
A DHT Oriented Peer To Peer Network with New Hash Function A Saroliya, R Purohit, U Mishra, A Rana, A Bansal | | |