A proposed novel architecture for information hiding in image steganography by using genetic algorithm and cryptography P Sethi, V Kapoor Procedia Computer Science 87, 61-66, 2016 | 54 | 2016 |
A Hybrid Cryptography Technique for Improving Network Security R Yadav, V Kapoor LAP LAMBERT Academic Publishing LAP LAMBERT Academic Publishing, 2016 | 43* | 2016 |
An empirical study of the role of control parameters of genetic algorithms in function optimization problems V Kapoor, S Dey, AP Khurana International Journal of Computer Applications 31 (6), 20-26, 2011 | 21 | 2011 |
A review on security mechanism of Bluetooth communication T Panse, V Kapoor International Journal of Computer Science and Information Technologies 3 (2 …, 2012 | 17 | 2012 |
Emerging security algorithms and techniques K Ahmad, MN Doja, NI Udzir, MP Singh CRC Press, 2019 | 14 | 2019 |
Secure communication using RSA algorithm for network environment A Jain, V Kapoor International Journal of Computer Applications 118 (7), 6-9, 2015 | 14 | 2015 |
An enhanced LSB based video steganographic system for secure and efficient data transmission V Kapoor, A Mirza International Journal of Computer Applications 121 (10), 2015 | 14 | 2015 |
Genetic algorithm: An application to technical trading system design V Kapoor, S Dey, AP Khurana International Journal of Computer Applications 36 (5), 44-50, 2011 | 13 | 2011 |
A hybrid cryptography technique to support cyber security infrastructure V Kapoor, R Yadav International Journal of Advanced Research in Computer Engineering …, 2015 | 12 | 2015 |
Empirical analysis and random respectful recombination of crossover and mutation in genetic algorithms V Kapoor, S Dey, AP Khurana International Journal of Computer Applications. Special issue on …, 2010 | 12 | 2010 |
Modeling the influence of world stock markets on Indian NSE index V Kapoor, S Dey, AP Khurana Journal of Statistics and Management Systems 23 (2), 249-261, 2020 | 11 | 2020 |
Secure and efficient data privacy, authentication and integrity schemes using hybrid cryptography S Bhat, V Kapoor International Conference on Advanced Computing Networking and Informatics …, 2019 | 11 | 2019 |
Hybrid cryptographic technique to secure data in web application N Gupta, V Kapoor Journal of Discrete Mathematical Sciences and Cryptography 23 (1), 125-135, 2020 | 10 | 2020 |
Competing secure text encryption in intranet using elliptic curve cryptography A Kumari, V Kapoor Journal of Discrete Mathematical Sciences and Cryptography 23 (2), 631-641, 2020 | 9 | 2020 |
Novel hybrid cryptography for confidentiality, integrity, authentication A Jain, V Kapoor Int. J. Comput. Appl 171 (August), 2017 | 8 | 2017 |
A new cryptography algorithm with an integrated scheme to improve data security V Kapoor International Journal of Scientific Research in Network Security and …, 2013 | 8 | 2013 |
A Review on Key Agreement Protocols used in Bluetooth Standard and Security Vulnerabilities in Bluetooth Transmission T Panse, V Kapoor, P Panse International Journal of Information and Communication Technology Research 2 …, 2012 | 7 | 2012 |
An integrated scheme based on triple DES, RSA and MD5 to enhance the security in bluetooth communication T Panse, V Kapoor International Journal of Computer Applications 50 (7), 2012 | 6 | 2012 |
Hybrid symmetric cryptography approach for secure communication in web application V Kapoor, R Gupta Journal of Discrete Mathematical Sciences and Cryptography 24 (5), 1179-1187, 2021 | 5 | 2021 |
Genetic algorithms and applications for stock trading optimization V Kapoor, S Dey IGI Global, 2021 | 5 | 2021 |