Different flavours of man-in-the-middle attack, consequences and feasible solutions GN Nayak, SG Samaddar 2010 3rd International Conference on Computer Science and Information …, 2010 | 130 | 2010 |
Theories and Application of Time Variant Key in RSA and that with selective encryption in AES CT Bhunia, G Mondal, S Samaddar Proc. EAIT, Elsevier Publications, Calcutta CSI-06, 219-221, 2006 | 28 | 2006 |
Enhancing VPN security through security policy management AK Singh, SG Samaddar, AK Misra 2012 1st International Conference on Recent Advances in Information …, 2012 | 23 | 2012 |
An efficient web mining algorithm for Web Log analysis: E-Web Miner MP Yadav, PK Keserwani, SG Samaddar 2012 1st International Conference on Recent Advances in Information …, 2012 | 21 | 2012 |
Komal chaul–A potential candidate for geographical indication SG Samaddar, AB Samaddar CSIR, 2010 | 19 | 2010 |
Practical insights into intellectual property strategy for a technical institute SG Samaddar, BD Chaudhary CSIR, 2008 | 19 | 2008 |
Service oriented architecture based SDI model for geographical indication web services RK Barik, AB Samaddar, SG Samaddar International Journal of Computer Applications 25 (4), 42-49, 2011 | 17 | 2011 |
A robust lightweight ECC-based three-way authentication scheme for IoT in cloud S Chatterjee, SG Samaddar Smart Computing Paradigms: New Progresses and Challenges: Proceedings of …, 2020 | 12 | 2020 |
A dynamic model for evaluation of usefulness of faculty development programmes in the area of business management S Nandan, SG Samaddar, T Nandan Serbian Journal of Management 5 (2), 251-259, 2010 | 12 | 2010 |
Extending IEEE LTSA e-Learning framework in secured SOA environment P Kumar, SG Samaddar, AB Samaddar, AK Misra 2010 2nd International Conference on Education Technology and Computer 2, V2 …, 2010 | 11 | 2010 |
Digital forensic enabled image authentication using least significant bit (lsb) with tamper localization based hash function UK Das, SG Samaddar, PK Keserwani Intelligent Communication and Computational Technologies: Proceedings of …, 2018 | 10 | 2018 |
Enhancing Koyama Scheme Using Selective Encryption Technique in RSA-based Singular Cubic Curve with AVK. K Singh, SG Samaddar Int. J. Netw. Secur. 14 (3), 164-172, 2012 | 10 | 2012 |
A decision support system in healthcare prediction AK Mishra, PK Keserwani, SG Samaddar, HB Lamichaney, AK Mishra Advanced Computational and Communication Paradigms: Proceedings of …, 2018 | 9 | 2018 |
Tools and techniques in optimization of network resources MSA Ansari, MC Govil, K Pal, SG Samaddar 2020 3rd International Conference on Emerging Technologies in Computer …, 2020 | 8 | 2020 |
Communication based vulnerabilities and script based solvabilities AK Singh, P Tewari, SG Samaddar, AK Misra Proceedings of the 2011 International Conference on Communication, Computing …, 2011 | 8 | 2011 |
Recognition techniques in Buddhist iconography and challenges G Bhaumik, SG Samaddar, AB Samaddar 2018 international conference on advances in computing, communications and …, 2018 | 5 | 2018 |
A comparative study of machine learning methods for generation of digital forensic validated data N Kumar, PK Keserwani, SG Samaddar 2017 ninth international conference on advanced computing (ICoAC), 15-20, 2017 | 5 | 2017 |
Customization of Service level agreement for digital forensics as a service PK Keserwani, SG Samaddar Proceedings of the 7th International Conference on Computer and …, 2017 | 5 | 2017 |
Vulnerabilities of Electronics Communication: solution mechanism through script AK Singh, P Tewari, SG Samaddar, AK Misra International Journal of Computer Science Issues (IJCSI) 8 (3), 2011 | 5 | 2011 |
Increasing robustness of RC4 family for automated selection of ciphersuites AK Singh, SG Samaddar, SR Sahoo, G Mathew Procedia Engineering 30, 45-52, 2012 | 4 | 2012 |