متابعة
Umashankar Rawat
Umashankar Rawat
Manipal University Jaipur
بريد إلكتروني تم التحقق منه على jaipur.manipal.edu
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map
M Kaur, D Singh, K Sun, U Rawat
Future Generation Computer Systems 107, 333-350, 2020
1522020
Image forgery detection using singular value decomposition with some attacks
NK Rathore, NK Jain, PK Shukla, US Rawat, R Dubey
National Academy Science Letters 44 (4), 331-338, 2021
1042021
A lightweight cellular automata based encryption technique for IoT applications
S Roy, U Rawat, J Karjee
IEEE Access 7, 39782-39793, 2019
662019
IEHC: An efficient image encryption technique using hybrid chaotic map
K Kumar, S Roy, U Rawat, S Malhotra
Chaos, Solitons & Fractals 158, 111994, 2022
572022
IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata
S Roy, M Shrivastava, CV Pandey, SK Nayak, U Rawat
Multimedia Tools and Applications 80, 31529-31567, 2021
502021
IECA: an efficient IoT friendly image encryption technique using programmable cellular automata
S Roy, U Rawat, HA Sareen, SK Nayak
Journal of Ambient Intelligence and Humanized Computing 11, 5083-5102, 2020
502020
Lightweight solutions to counter DDoS attacks in software defined networking
M Conti, C Lal, R Mohammadi, U Rawat
Wireless Networks 25, 2751-2768, 2019
472019
Symmetric key encryption technique: a cellular automata based approach in wireless sensor networks
S Roy, J Karjee, US Rawat, N Dey
Procedia Computer Science 78, 408-414, 2016
472016
IESCA: An efficient image encryption scheme using 2-D cellular automata
S Roy, M Shrivastava, U Rawat, CV Pandey, SK Nayak
Journal of Information Security and Applications 61, 102919, 2021
452021
[Retracted] A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis
S Acharya, U Rawat, R Bhatnagar
Security and Communication Networks 2022 (1), 7775917, 2022
282022
Distributed biomedical scheme for controlled recovery of medical encrypted images
D Pandey, U Rawat, NK Rathore, K Pandey, PK Shukla
IRBM 43 (3), 151-160, 2022
182022
Efficient hybrid load balancing algorithm
NK Rathore, U Rawat, SC Kulhari
National Academy Science Letters 43, 177-185, 2020
182020
A low computational cost method for mobile malware detection using transfer learning and familial classification using topic modelling
S Acharya, U Rawat, R Bhatnagar
Applied Computational Intelligence and Soft Computing 2022 (1), 4119500, 2022
172022
Symmetric key encryption technique: a cellular automata based approach
D Parashar, S Roy, N Dey, V Jain, US Rawat
Cyber Security: Proceedings of CSI 2015, 59-67, 2018
172018
Robust progressive block based visual cryptography with chaotic map
D Pandey, US Rawat, A Kumar
Journal of Discrete Mathematical Sciences and Cryptography 19 (5-6), 1025-1040, 2016
142016
An energy efficient, robust, sustainable, and low computational cost method for mobile malware detection
R Chopra, S Acharya, U Rawat, R Bhatnagar
Applied Computational Intelligence and Soft Computing 2023 (1), 2029064, 2023
102023
Secure vertical handover to NEMO using hybrid cryptosystem
VR Reddicherla, U Rawat, YJN Kumar, A Zaguia
Security and Communication Networks 2021 (1), 6751423, 2021
92021
A novel cryptosystem using cellular automata
S Roy, N Bhatia, US Rawat
2017 International Conference on Communication and Signal Processing (ICCSP …, 2017
92017
Secure Vertical Handover to NEMO using Hybrid Cryptosystem
A Zaguia, V Raju, YJN Kumar, U Rawat
Hindawi, Article ID 6751423, 0
9
An efficient image encryption technique using Logistic map and 2D-TCLM
K Kumar, S Roy, U Rawat, I Mishra
International Conference on Cyber Warfare, Security and Space Research, 87-96, 2021
62021
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20