An asymmetric image encryption based on phase truncated hybrid transform M Khurana, H Singh 3D Research 8, 1-17, 2017 | 46 | 2017 |
Secure image encryption technique based on jigsaw transform and chaotic scrambling using digital image watermarking M Arora, M Khurana Optical and Quantum Electronics 52 (2), 59, 2020 | 27 | 2020 |
A spiral-phase rear mounted triple masking for secure optical image encryption based on gyrator transform M Khurana, H Singh Recent patents on Computer Science 12 (2), 80-94, 2019 | 20 | 2019 |
Two level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signatures M Khurana, H Singh Multimedia Tools and Applications 79 (19), 13967-13986, 2020 | 17 | 2020 |
Asymmetric optical image triple masking encryption based on Gyrator and Fresnel transforms to remove silhouette problem M Khurana, H Singh 3D Research 9 (3), 38, 2018 | 17 | 2018 |
Location privacy using homomorphic encryption over cloud A Rohilla, M Khurana, L Singh International Journal of Computer Network and Information Security 11 (8), 32, 2017 | 16 | 2017 |
Cryptographic security using various encryption and decryption method R Goyal, M Khurana International Journal of Mathematical Sciences and Computing (IJMSC) 3 (3), 1-11, 2017 | 14 | 2017 |
Weighted centroid range free localization algorithm based on IOT N Sharma, G Chawla, M Khurana International Journal of Computer Applications 83 (9), 27-30, 2013 | 13 | 2013 |
Spiral-phase masked optical image health care encryption system for medical images based on fast Walsh-Hadamard transform for security enhancement M Khurana, H Singh International Journal of Healthcare Information Systems and Informatics …, 2018 | 12 | 2018 |
Variants of Differential and Linear Cryptanalysis M Khurana, M Kumari Cryptology ePrint Archive, 2015 | 12 | 2015 |
Multiple iris image encryption using phase retrieval mask, QZ algorithm and umbrella map in hybrid transform domain P Rakheja, M Khurana Optical and Quantum Electronics 55 (10), 878, 2023 | 10 | 2023 |
Asymmetric optical image triple masking encryption based on gyrator and Fresnel transforms to remove silhouette problem. 3D Res. 9 (38),(2018) M Khurana, H Singh Google Scholar Google Scholar Digital Library Digital Library, 2018 | 9 | 2018 |
Security Primitives: Block and Stream Ciphers MKM Kumari International Journal of Innovations & Advancement in Computer Science 4 …, 2015 | 9* | 2015 |
Data computation and secure encryption based on gyrator transform using singular value decomposition and randomization M Khurana, H Singh Procedia computer science 132, 1636-1645, 2018 | 8 | 2018 |
Asymmetric optical image encryption using random Hilbert mask based on fast Walsh Hadamard transform M Khurana, H Singh 2017 International Conference on Computing and Communication Technologies …, 2017 | 7 | 2017 |
An improvement of Centroid Algorithm based on distance in Wireless Sensor Network M Khurana, A Payal International Journal of Smart Sensors and Ad-Hoc Networks 1 (1), 28-32, 2011 | 7 | 2011 |
Cloud security: the future of data storage P Bajaj, R Arora, M Khurana, S Mahajan Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021, 87-98, 2022 | 6 | 2022 |
Analysis of DV-Hop Localization Algorithm in Wireless Sensor Networks AP Mehak Khurana Proceedings of the 5th National Conference; INDIACom-2011, 2011 | 6* | 2011 |
Optical image encryption using Fresnel zone plate mask based on fast Walsh Hadamard transform M Khurana, H Singh AIP Conference Proceedings 1953 (1), 2018 | 5 | 2018 |
Buffer overflow and SQL injection: To remotely attack and access information M Khurana, R Yadav, M Kumari Cyber Security: Proceedings of CSI 2015, 301-313, 2018 | 5 | 2018 |