Security, privacy, trust, and anonymity S Namasudra, D Devi, S Choudhary, R Patan, S Kallam Advances of DNA computing in cryptography, 138-150, 2018 | 40 | 2018 |
Analysis of security-based access control models for cloud computing S Choudhary, N Singh International Journal of Cloud Applications and Computing (IJCAC) 12 (1), 1-19, 2022 | 12 | 2022 |
Security of Multimedia in Cloud using Secret Shared Key K Sinha, S Choudhary, S Paul, P Paul 2018 International Conference on Computing, Power and Communication …, 2018 | 11 | 2018 |
Image Denoising Technique Using Various Filters Models: A Survey A Priya, K Sinha, S Choudhary, S Pridarshini 2018 International Conference on Computing, Power and Communication …, 2018 | 5 | 2018 |
The Profiled Feldman-Cousins technique for confidence interval construction in the presence of nuisance parameters MA Acero, B Acharya, P Adamson, L Aliaga, N Anfimov, A Antoshkin, ... arXiv preprint arXiv:2207.14353, 2022 | 4 | 2022 |
Safety Measures and Auto Detection against SQL Injection Attacks S Choudhary, N Singh International Journal of Engineering and Advanced Technology (IJEAT) 9 …, 2019 | 3 | 2019 |
Network Congestion Control through VTP Approach S Choudhary, P Karan, R Nallanthighal International Journal of Engineering Research and Development 10 (5), 82-86, 2014 | 1 | 2014 |
Data Security in Cloud Environment Using Light Weight Secret Key S Choudhary, N Singh 2020 IEEE 5th International Conference on Computing Communication and …, 2020 | | 2020 |