Three step data security model for cloud computing based on RSA and steganography VK Pant, J Prakash, A Asthana 2015 International Conference on Green Computing and Internet of Things …, 2015 | 60 | 2015 |
Image enhancement using fuzzy technique T Mahashwari, A Asthana International Journal of Research in Engineering Science and Technology 2 (2 …, 2013 | 57 | 2013 |
Inheritance of Cercospora Leaf Spot Resistance in Mung Bean, Vigna radiata (L.) Wilczek SP Mishra, AN Asthana, L Yadav Plant breeding 100 (3), 228-229, 1988 | 28 | 1988 |
Light-Fidelity (Li-Fi): transmission of data through light of future technology P Verma, J Shekhar, A Asthana International Journal of Computer Science and Mobile Computing 4 (9), 113-124, 2015 | 25 | 2015 |
Vertical handoffs in fourth generation wireless networks RK Singh, A Asthana, A Balyan, SJ Gupta, P Kumar International Journal of Soft Computing and Engineering (IJSCE) 2 (2), 481-490, 2012 | 23 | 2012 |
An Adaptive Steganography Technique for Gray and Colored Images A Asthana, S Johri International Journal of Advanced Research in Computer Science and Software …, 2012 | 4 | 2012 |
An adaptive steganography technique for gray and colored images S Johri Journal of Global Research in Computer Science 3 (3), 41-45, 2012 | 4 | 2012 |
Exploring Snippets as a Dataset to Overcome Challenges in CLIR A Asthana, SK Dwivedi ITM Web of Conferences 54, 01012, 2023 | 2 | 2023 |
Data representation in big data via succinct data structures V Kumar, J Shekhar, S Kumar Int. J. Eng. Sci. Technol.(IJEST) 10 (1), 21-28, 2018 | 2 | 2018 |
A novel effective approach for analytical monitoring: Qos for web services A Asthana, A Misra, MC Pandey, V Tiwari Asian Journal of Applied Science and Technology (AJAST) 1 (5), 157-163, 2017 | 2 | 2017 |
Digital Right Management Model Based on Cryptography for Mobile Multimedia Content. P Verma, J Shekhar, A Asthana International Journal of Advanced Research in Computer Science 7 (2), 2016 | 2 | 2016 |
A model for evaluating and maintaining load balancing in cloud computing P Verma, J Shekhar, A Asthana IJCSMC 3 (3), 501-509, 2014 | 2 | 2014 |
A quantitative evaluation of online translators using Hindi web queries A Asthana, SK Dwivedi Journal of Intelligent & Fuzzy Systems, 1-10, 0 | 2 | |
A nucleic filter to enhance the security in cloud computing environment OD Singh, A Asthana, Y Kushwaha 2016 3rd International Conference on Computing for Sustainable Global …, 2016 | 1 | 2016 |
Steganography: A New Technique To Hide Information Within Image File RK Singh, A Asthana LAP Lambert Academic Publishing, 2012 | 1 | 2012 |
Intrusion Detection Solution Using Anomaly Detection Scheme MS Sharma, M AmitAsthana, MMC Pandey International Journal Of Advance Research In Science And Engineering, ISSN …, 0 | 1 | |
An Adaptive Security Scheme for Secret Data using Cryptography and Steganography A Agarwal, A Asthana 2nd International Conference on Role of Technology in Nation Building …, 0 | 1 | |
A Performance Evaluation of Cross-lingual and Monolingual IR G Chandra, A Asthana, MS Pandey, M Dixit, SK Dwivedi, AP Dwivedi International Conference on Computing and Communication Systems for …, 2024 | | 2024 |
Handling Compound Hindi OOV words in web queries A Asthana, SK Dwivedi, AP Dwivedi | | 2022 |
Data Mining and Data Warehousing: Practical Machine Learning Tools Techniques RK Singh, A Asthana LAP Lambert Academic Publishing, 2012 | | 2012 |