A comparative study of cloud security ontologies V Singh, SK Pandey Proceedings of 3rd International Conference on Reliability, Infocom …, 2014 | 115 | 2014 |
Revisiting requirements elicitation techniques S Sharma, SK Pandey International Journal of Computer Applications 75 (12), 2013 | 105 | 2013 |
Requirements elicitation: Issues and challenges S Sharma, SK Pandey 2014 international conference on computing for sustainable global …, 2014 | 68 | 2014 |
Software security rules, SDLC perspective C Banerjee, SK Pandey arXiv preprint arXiv:0911.0494, 2009 | 49 | 2009 |
A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem V Kumar, R Kumar, SK Pandey Journal of King Saud University-Computer and Information Sciences 32 (9 …, 2020 | 43 | 2020 |
A comparative study of risk assessment methodologies for information systems SK Pandey Bulletin of Electrical Engineering and Informatics 1 (2), 111-122, 2012 | 41 | 2012 |
Research on software security awareness: problems and prospects C Banerjee, SK Pandey ACM SIGSOFT Software Engineering Notes 35 (5), 1-5, 2010 | 31 | 2010 |
Formal methods in requirements phase of SDLC SK Pandey, M Batra International Journal of Computer Applications 70 (13), 7-14, 2013 | 29 | 2013 |
Revisiting security ontologies V Singh, SK Pandey International Journal of Computer Science Issues (IJCSI) 11 (6), 150, 2014 | 25 | 2014 |
Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups V Kumar, R Kumar, SK Pandey International Journal of Information Technology 12 (1), 283-288, 2020 | 23 | 2020 |
Fully homomorphic encryption scheme with probabilistic encryption based on Euler’s theorem and application in cloud computing V Kumar, R Kumar, SK Pandey, M Alam Big Data Analytics: Proceedings of CSI 2015, 605-611, 2018 | 22 | 2018 |
Research in cloud security: problems and prospects V Singh, SK Pandey International Journal of Computer Science Engineering and Information …, 2013 | 19 | 2013 |
Revisiting cloud security issues and challenges V Singh, SK Pandey International Journal of Advanced Research in Computer Science and Software …, 2013 | 19 | 2013 |
Integrating AI techniques in requirements phase: a literature review S Sharma, SK Pandey IJCA Proceedings on 4th International IT Summit Confluence, 21-25, 2013 | 19 | 2013 |
Cloud security related threats V Singh, SK Pandey International Journal of Scientific & Engineering Research 4 (9), 2571, 2013 | 17 | 2013 |
LKM-AMI: a lightweight key management scheme for secure two way communications between smart meters and HAN devices of AMI system in smart grid V Kumar, R Kumar, SK Pandey Peer-to-Peer Networking and Applications 14 (1), 82-100, 2021 | 16 | 2021 |
An enhanced and secured RSA public key cryptosystem algorithm using Chinese remainder theorem V Kumar, R Kumar, SK Pandey Smart and Innovative Trends in Next Generation Computing Technologies: Third …, 2018 | 16 | 2018 |
Sharma SK Pandey Libraries and Society” ESS ESS Publication, New Delhi, 1992 | 16 | 1992 |
A secure and robust group key distribution and authentication protocol with efficient rekey mechanism for dynamic access control in secure group communications V Kumar, R Kumar, SK Pandey International Journal of Communication Systems 33 (14), e4465, 2020 | 15 | 2020 |
Security in coding phase of SDLC R Kumar, SK Pandey, SI Ahson 2007 Third International Conference on Wireless Communication and Sensor …, 2007 | 15 | 2007 |