A Review on Secure Data Deduplication: Cloud Storage Security Issue P Prajapati, P Shah Journal of King Saud University-Computer and Information Sciences 34 (7 …, 2022 | 88 | 2022 |
A Review of Various Challenges in Cybersecurity using Artificial Intelligence H Chaudhary, A Detroja, P Prajapati, P Shah 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS …, 2020 | 22 | 2020 |
Efficient Cross User Client Side Data Deduplication in Hadoop P Prajapati, P Shah, A Ganatra, S Patel 2nd International Conference on Bioinformatics and Computer Engineering …, 2016 | 16 | 2016 |
Efficient cross user Data Deduplication in Remote Data Storage P Prajapati, P Shah International Conference for Convergence for Technology-2014, 1-5, 2014 | 16 | 2014 |
Provable Data Possession using Additive Homomorphic Encryption P Shah, P Prajapati Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022 | 12 | 2022 |
Provable Data Possession Using Identity Based Encryption S Kadvani, A Patel, M Tilala, P Prajapati, P Shah 3rd International Conference on ICT for Intelligent Systems (ICTIS 2018 …, 2018 | 11 | 2018 |
A Review on Recent Intrusion Detection Systems and Intrusion Prevention Systems in IoT P Prajapati, B Bhatt, G Zalavadiya, M Ajwalia, P Shah 2021 11th International Conference on Cloud Computing, Data Science …, 2021 | 10 | 2021 |
A Review of Recent Detection Methods For HTTP DDoS Attacks P Prajapati, N Patel, P Shah International Journal of Scientific and Technology Research 8 (12), 1693-1696, 2019 | 9 | 2019 |
A Review of Recent Blockchain Applications P Prajapati, K Dave, P Shah International Journal of Scientific and Technology Research 9 (1), 897-903, 2020 | 8 | 2020 |
A Review of Recent Trends on DNA Based Cryptography G Bhoi, R Bhavsar, P Prajapati, P Shah 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS …, 2020 | 3 | 2020 |
A Review on Different Techniques used to detect the Malicious Applications for Securing the Android Operating System P Prajapati, D Bhagat, P Shah International Journal of Scientific and Technology Research 9 (2), 5255-5258, 2020 | 3 | 2020 |
Casper: Modification of Bitcoin using Proof of Stake N Sheth, P Prajapati, A Shaikh, P Shah 3rd International Conference on ICT for Intelligent Systems (ICTIS 2018 …, 2018 | 2 | 2018 |
Smishing: A SMS Phishing Detection Using Various Machine Learning Algorithms P Prajapati, H Nandani, D Shah, S Shah, R Shah, M Ajwalia, P Shah Communication and Intelligent Systems, 5th International Conference on …, 2024 | | 2024 |
Enhancing Security in a University Network using Snort and Wireshark P Prajapati, P Shah, D Shah, S Shah, R Shah, M Ajwalia 8th International Conference on Information and Communication Technology for …, 2024 | | 2024 |
Phishing E-mail Detection using Machine Learning P Prajapati, Y Bhadania, A Joshi, Y Jani, H Nandani, M Ajwalia, P Shah 4th International Conference on Smart Systems: Innovations in Computing …, 2024 | | 2024 |
Identity-Based Encryption (IBE) based Improved Data Possession Techniques P Shah, P Prajapati ICT Systems and Sustainability, 8th International Conference on ICT …, 2023 | | 2023 |
Privacy Challenges and Solutions in Implementing Searchable Encryption for Cloud Storage A Patel, P Prajapati, P Shah, V Sangani, M Ajwalia, T Upadhyaya ICT with Intelligent Applications, 7th International Conference on …, 2023 | | 2023 |
Code Buddy: A Machine Learning-Based Automatic Source Code Quality Reviewing System N Patel, A Mehta, P Prajapati, J Biskitwala Congress on Intelligent Systems (CIS 2020) 1334, 453-462, 2021 | | 2021 |