Secure Image Hiding Algorithm using Cryptography and Steganography H Sharma, M Arya, D Goyal IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN, 2278-0661, 2013 | 44 | 2013 |
Detection and tracking of moving cloud services from video using saliency map model S Kamble, DKJ Saini, V Kumar, AK Gautam, S Verma, A Tiwari, D Goyal Journal of Discrete Mathematical Sciences and Cryptography 25 (4), 1083-1092, 2022 | 33 | 2022 |
An efficient approach for big data processing using spatial Boolean queries P Dadheech, D Goyal, S Srivastava, CM Choudhary Journal of Statistics and Management Systems 21 (4), 583-591, 2018 | 33 | 2018 |
BlackHole Attack and Detection Method for AODV Routing Protocol in MANETs V Khandelwal, D Goyal International Journal of Advanced Research in Computer Engineering …, 2013 | 31 | 2013 |
A Scalable Data Processing Using Hadoop & MapReduce for Big Data P Dadheech, D Goyal, S Srivastava, A Kumar Journal of Advance Research in Dynamical & Control Systems 10 (02), 2099-2109, 2018 | 29 | 2018 |
Chaos based image encryption security in cloud computing S Kumar, PK Srivastava, GK Srivastava, P Singhal, D Singh, D Goyal Journal of Discrete Mathematical Sciences and Cryptography 25 (4), 1041-1051, 2022 | 27 | 2022 |
Digital watermarking-based cryptosystem for cloud resource provisioning S Kumar, S Kumar, N Ranjan, S Tiwari, TR Kumar, D Goyal, G Sharma, ... International Journal of Cloud Applications and Computing (IJCAC) 12 (1), 1-20, 2022 | 27 | 2022 |
A Novel Framework for Performance Optimization of Routing Protocol in VANET Network A Kumar, D Goyal, P Dadheech Journal of Advance Research in Dynamical & Control Systems 10 (2 (Special …, 2018 | 26 | 2018 |
Issues in existing robotic service in restaurants and hotels N Mishraa, D Goyal, AD Sharma Proceedings of 3rd International Conference on Internet of Things and …, 2018 | 25 | 2018 |
A Sustainable and Secure Cloud resource provisioning system in Industrial Internet of Things (IIoT) based on Image Encryption CT Dora Pravina, MU Buradkar, MK Jamal, A Tiwari, U Mamodiya, ... Proceedings of the 4th International Conference on Information Management …, 2022 | 24 | 2022 |
Internet of thing uses in materialistic ameliorate farming through AI PK Srivastava, S Kumar, A Tiwari, D Goyal, U Mamodiya AIP Conference Proceedings 2782 (1), 2023 | 23 | 2023 |
Cloud data centre energy utilization estimation: Simulation and modelling with idr RKS Rajput, D Goyal, A Pant, G Sharma, V Arya, MK Rafsanjani International Journal of Cloud Applications and Computing (IJCAC) 12 (1), 1-16, 2022 | 23 | 2022 |
A Reliable ATM Protocol and Comparative Analysis on Various Parameters with Other ATM Protocols AA Duvey, D Goyal, N Hemrajani International Journal of Communication and Computer Technologies 1 (56), 6, 2013 | 20* | 2013 |
Automation in restaurants: ordering to robots in restaurant via smart ordering system N Mishra, D Goyal, AD Sharma Int J Technol Manage 4 (1), 1-4, 2018 | 19 | 2018 |
Time Quantum Based Improved Scheduling Algorithm L Kishor, D Goyal International Journal of Advanced Research in Computer Science and …, 2013 | 18 | 2013 |
Big data: A review of analytics methods & techniques Y Arora, D Goyal 2016 2nd International Conference on Contemporary Computing and Informatics …, 2016 | 17 | 2016 |
Analysis of Robust Watermarking Technique Using Mid Band DCT Domain for Different Image Formats R Chaturvedi, A Sharma, N Hemrajani, D Goyal International Journal of Scientific and Research Publications 2 (3), 4, 2012 | 15 | 2012 |
Operating system security with discrete mathematical structure for secure round robin scheduling method with intelligent time quantum A Kumar, AK Gupta, D Panwar, S Chaurasia, D Goyal Journal of Discrete Mathematical Sciences and Cryptography 26 (5), 1519-1533, 2023 | 14 | 2023 |
Securing wireless sensor networks with novel hybrid lightweight cryptographic protocols D Goyal, A Kumar, Y Gandhi, V Khetani Journal of Discrete Mathematical Sciences and Cryptography 27, 703-714, 2024 | 12 | 2024 |
Novel Selective Video Encryption for H.264 Video D Goyal, N Hemrajani International Journal of Information Security Science 3 (4), 11, 2014 | 12* | 2014 |