关注
Dr Santosh K Pandey
Dr Santosh K Pandey
Department of Electronics and IT, Ministry of Communications and IT, Govt. of India
没有经过验证的电子邮件地址
标题
引用次数
引用次数
年份
A comparative study of cloud security ontologies
V Singh, SK Pandey
Proceedings of 3rd International Conference on Reliability, Infocom …, 2014
1152014
Revisiting requirements elicitation techniques
S Sharma, SK Pandey
International Journal of Computer Applications 75 (12), 2013
1052013
Requirements elicitation: Issues and challenges
S Sharma, SK Pandey
2014 international conference on computing for sustainable global …, 2014
682014
Software security rules, SDLC perspective
C Banerjee, SK Pandey
arXiv preprint arXiv:0911.0494, 2009
492009
A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem
V Kumar, R Kumar, SK Pandey
Journal of King Saud University-Computer and Information Sciences 32 (9 …, 2020
432020
A comparative study of risk assessment methodologies for information systems
SK Pandey
Bulletin of Electrical Engineering and Informatics 1 (2), 111-122, 2012
412012
Research on software security awareness: problems and prospects
C Banerjee, SK Pandey
ACM SIGSOFT Software Engineering Notes 35 (5), 1-5, 2010
312010
Formal methods in requirements phase of SDLC
SK Pandey, M Batra
International Journal of Computer Applications 70 (13), 7-14, 2013
292013
Revisiting security ontologies
V Singh, SK Pandey
International Journal of Computer Science Issues (IJCSI) 11 (6), 150, 2014
252014
Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups
V Kumar, R Kumar, SK Pandey
International Journal of Information Technology 12 (1), 283-288, 2020
232020
Fully homomorphic encryption scheme with probabilistic encryption based on Euler’s theorem and application in cloud computing
V Kumar, R Kumar, SK Pandey, M Alam
Big Data Analytics: Proceedings of CSI 2015, 605-611, 2018
222018
Research in cloud security: problems and prospects
V Singh, SK Pandey
International Journal of Computer Science Engineering and Information …, 2013
192013
Revisiting cloud security issues and challenges
V Singh, SK Pandey
International Journal of Advanced Research in Computer Science and Software …, 2013
192013
Integrating AI techniques in requirements phase: a literature review
S Sharma, SK Pandey
IJCA Proceedings on 4th International IT Summit Confluence, 21-25, 2013
192013
Cloud security related threats
V Singh, SK Pandey
International Journal of Scientific & Engineering Research 4 (9), 2571, 2013
172013
LKM-AMI: a lightweight key management scheme for secure two way communications between smart meters and HAN devices of AMI system in smart grid
V Kumar, R Kumar, SK Pandey
Peer-to-Peer Networking and Applications 14 (1), 82-100, 2021
162021
An enhanced and secured RSA public key cryptosystem algorithm using Chinese remainder theorem
V Kumar, R Kumar, SK Pandey
Smart and Innovative Trends in Next Generation Computing Technologies: Third …, 2018
162018
Sharma
SK Pandey
Libraries and Society” ESS ESS Publication, New Delhi, 1992
161992
A secure and robust group key distribution and authentication protocol with efficient rekey mechanism for dynamic access control in secure group communications
V Kumar, R Kumar, SK Pandey
International Journal of Communication Systems 33 (14), e4465, 2020
152020
Security in coding phase of SDLC
R Kumar, SK Pandey, SI Ahson
2007 Third International Conference on Wireless Communication and Sensor …, 2007
152007
系统目前无法执行此操作,请稍后再试。
文章 1–20