A visual cryptographic technique to secure image shares J Verma, V Khemchandani International Journal of Engineering Research and Applications 2 (1), 1121-1125, 2012 | 52 | 2012 |
Identity-based cryptography techniques and applications (a review) D Anand, V Khemchandani, RK Sharma 2013 5th international conference and computational intelligence and …, 2013 | 51 | 2013 |
Feature engineering (FE) tools and techniques for better classification performance T Rawat, V Khemchandani International Journal of Innovations in Engineering and Technology 8 (2 …, 2017 | 49 | 2017 |
Securing visual cryptographic shares using public key encryption K Kaur, V Khemchandani 2013 3rd IEEE International Advance Computing Conference (IACC), 1108-1113, 2013 | 39 | 2013 |
Data security and privacy functions in fog computing for healthcare 4.0 D Anand, V Khemchandani Fog Data Analytics for IoT Applications: Next Generation Process Model with …, 2020 | 28 | 2020 |
Study of e-governance in India: a survey D Anand, V Khemchandani International Journal of Electronic Security and Digital Forensics 11 (2 …, 2019 | 22 | 2019 |
Unified and integrated authentication and key agreement scheme for e-governance system without verification table D Anand, V Khemchandani Sādhanā 44 (9), 192, 2019 | 17 | 2019 |
Identity and access management systems D Anand, V Khemchandani Security and Privacy of Electronic Healthcare Records: Concepts, Paradigms …, 2019 | 16 | 2019 |
An analytical method to audit Indian e-governance system D Anand, V Khemchandani International Journal of Electronic Government Research (IJEGR) 13 (3), 18-37, 2017 | 13 | 2017 |
Lightweight Technical Implementation of Single Sign‐On Authentication and Key Agreement Mechanism for Multiserver Architecture‐Based Systems D Anand, V Khemchandani, M Sabharawal, O Cheikhrouhou, O Ben Fredj Security and Communication Networks 2021 (1), 9940183, 2021 | 11 | 2021 |
The challenges for authentication in Indian e-governance system (a survey on Indian administrative staff) D Anand, V Khemchandani International Journal of Control Theory and Applications 40 (9), 335-346, 2016 | 9 | 2016 |
One v/s all SVM implementation for keystroke based authentication system DK Purwar, D Vishwakarma, N Singh, V Khemchandani 2019 4th International Conference on Information Systems and Computer …, 2019 | 5 | 2019 |
Multi/Swarm Drone Surveillance and Monitoring System using VR simulation S Devgan, S Walia, V Khemchandani, S Chandra 2022 IEEE Global Conference on Computing, Power and Communication …, 2022 | 3 | 2022 |
A multiplayer shooting game based simulation for defence training P Jindal, V Khemchandani, S Chandra, V Pandey 2021 International Conference on Computational Performance Evaluation (ComPE …, 2021 | 3 | 2021 |
Information Security and Sender's Rights Protection through Embedded Public Key Signature V Khemchandani, GN Purohit International Journal of Computer Science Issues (IJCSI) 7 (3), 27, 2010 | 3 | 2010 |
A deep learning approach to detect sustained attention in real-time using eeg signals A Tiwari, A Arora, V Goel, V Khemchandani, S Chandra, V Pandey 2021 International Conference on Computational Performance Evaluation (ComPE …, 2021 | 2 | 2021 |
A novel scheme for prevention of forgery and alteration in automated cheque payment system V Khemchandani, R Devi Proceedings of the 4th National Conference; INDIACom-2010 Computing for …, 2010 | 2 | 2010 |
Virtual Reality Based Attention Simulator using EEG Signals V Khemchandani, K Goswani, MP Teotia, S Chandra, NM Wadalkar 2023 2nd Edition of IEEE Delhi Section Flagship Conference (DELCON), 1-6, 2023 | 1 | 2023 |
Software Vulnerability Classification Using Learning Techniques BK Verma, AK Yadav, V Khemchandani International Conference on Computers, Management & Mathematical Sciences …, 2022 | 1 | 2022 |
Data security and privacy in 5g-enabled IoT D Anand, V Khemchandani Blockchain for 5G-Enabled IoT: The new wave for Industrial Automation, 279-301, 2021 | 1 | 2021 |