Performance analysis of AODV & DSR routing protocol in mobile ad hoc networks AN Thakare, MY Joshi IJCA Special Issue on MANETs 4, 211-218, 2010 | 64 | 2010 |
Robust image watermarking based on singular value decomposition and discrete wavelet transform MY Joshi 2010 3rd International conference on computer science and information …, 2010 | 34 | 2010 |
All frequency band DWT-SVD robust watermarking technique for color images in YUV color space SK Bhagyashri, MY Joshi 2011 IEEE International Conference on Computer Science and Automation …, 2011 | 30 | 2011 |
A simple and efficient solution to remote user authentication using smart cards M Misbahuddin, MA Ahmed, MH Shastri 2006 Innovations in Information Technology, 1-5, 2006 | 21 | 2006 |
Scalable key transport protocol using Chinese remainder theorem MY Joshi, RS Bichkar Security in Computing and Communications: International Symposium, SSCC 2013 …, 2013 | 6 | 2013 |
Analysis on logical key hierarchy and variants for secure group communication AS Pande, Y Joshi, MY Joshi Computing, Communication and Signal Processing: Proceedings of ICCASP 2018 …, 2018 | 3 | 2018 |
Analysis of Tree structure for Secure Group Communication Using LKH Approach A Pande, DY Joshi, D Joshi, D Wadhwa Int. J. Comput. Sci. Eng 7, 1130-1136, 2019 | 2 | 2019 |
A centralized key table based communication efficient group key management protocol MY Joshi, RS Bichkar Int. J. Comput. Netw. Inf. Secur.(8), 49-55, 2015 | 2 | 2015 |
Optimal Tree Structure for Secure Group Communication Using LKH Approach A Pande, DYV Joshi, DM Joshi, DL Wadhwa 2nd International Conference on Communication & Information Processing (ICCIP), 2020 | | 2020 |
Enhanced Strict Binary Logical Key Hierarchy Algorithm for Secure Group Communication AS Pande, YV Joshi, MY Joshi Computing in Engineering and Technology: Proceedings of ICCET 2019, 239-251, 2019 | | 2019 |
Cloud Data Security Using Third Party Auditor MYJ Aman Bhimrao Kamble International Journal of Scientific Research in Science, Engineering and …, 2018 | | 2018 |
A Secure End-To-End Protocol for Secure Transmission of SMS VV Mantri, MY Joshi International Journal of Science and Research (IJSR), Volume 7 Issue 4 PP …, 2018 | | 2018 |
A Secure End-To-End Protocol for Secure Transmission of SMS MYJ Vaidehi V. Mantri International Journal of Science and Research 7 (4), 1024-1047, 2018 | | 2018 |
Secure Forensic Report Retrieval Application using Cipher Text-Policy Attribute-Based Encryption MYJ Vinod I. Jondhale International Journal of Science and Research (IJSR) 7 (4), 980-983, 2018 | | 2018 |
Classification of Concept Drifting Data Streams Using Adaptive Novel - Class Detection MYJ Aparna Yeshwantrao Ladekar International Journal of Computer Engineering In Research Trends 3 (9), 514-520, 2016 | | 2016 |
On the analysis and design of key management systems for secure communication MY Joshi Swami Ramanand Teerth Marathwada University , Vishnupuri Nanded, 2015 | | 2015 |
An Efficient Group Key Transport Protocol MY Joshi, RS Bichkar International Journal of Computer Science and Information Technologies, Vol …, 2014 | | 2014 |
An authenticated key transport protocol using symmetric encryption MY Joshi, RS Bichkar 2010 3rd International Conference on Computer Science and Information …, 2010 | | 2010 |
Analysis of academic data using Ad-hoc association rule mining from star schema MYJ Navin Kumar International Seminar on IT in Academics, (ITA-2009), Sinhgad college of …, 2009 | | 2009 |
The Advantages Of Elliptic Curve Cryptography For Wireless Security MYJ Mr. Praful Pardhi International conference on Emerging trends in computing electronics …, 2008 | | 2008 |