Follow
Dr. Raman Kumar
Dr. Raman Kumar
I.K. Gujral Punjab Technical University
Verified email at ptu.ac.in
Title
Cited by
Cited by
Year
Hybrid Homomorphic Encryption Scheme for Secure Cloud Data Storage
B Seth, S Dalal, R Kumar
Recent Advances in Computational Intelligence, 71-92, 2019
492019
Robustness of Digital Image Watermarking Techniques against brightness and rotation attacks
H Verma, A Singh, R Kumar
IJCSIS) International Journal of Computer Science and Information Security, 2009
422009
Securing Bioinformatics Cloud for Big Data: Budding Buzzword or a Glance of the Future
B Seth, S Dalal, R Kumar
Recent Advances in Computational Intelligence, 121-147, 2019
322019
Blocking of sql injection attacks by comparing static and dynamic queries
J Minhas, R Kumar
IJ Computer Network and Information Security 2, 1-9, 2013
242013
Analysis and design of protocol for enhanced threshold proxy signature scheme based on RSA for known signers
R Kumar, HK Verma, R Dhir
Wireless Personal Communications 80, 1281-1345, 2015
182015
Cryptanalysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers
R Kumar, HK Verma, R Dhir
Mathematical Problems in Engineering 2013, 2013
172013
Security analysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers
R Kumar, HK Verma, R Dhir
International Journal of Computer Network and Information Security 4 (9), 63, 2012
172012
International Journal of Computer Network and Information Security (IJCNIS)
J Minhas, R Kumar
17*
An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for known Signers
R Kumar, HK Verma
IEEE 2nd International Advance Computing Conference, TU, India, 2010
152010
A Literature Survey on various Image Encryption & Steganography Techniques
M Dahiya, R Kumar
2018 First International Conference on Secure Cyber Computing and …, 2018
122018
Comparison of Threshold Proxy Signature Schemes.
HK Verma, K Kaur, R Kumar
Security and Management, 227-231, 2008
112008
A hybrid feature extraction technique for content based medical image retrieval using segmentation and clustering techniques
Madhu, R Kumar
Multimedia Tools Applications, 1380-7501, 2022
102022
Design of a Low-Cost Sensor-Based IOT System for Smart Irrigation
K Singh, R Kumar
Applications in Ubiquitous Computing, 59-79, 2021
102021
ANALYSIS AND DESIGN OF AN OPTIMIZED SECURE AUDITING PROTOCOL FOR STORING DATA DYNAMICALLY IN CLOUD COMPUTING,
R Kumar, G Singh
International Conference on Processing of Materials, Minerals and Energy …, 2016
102016
Secure threshold proxy signature scheme based on RSA for known signers
R Kumar, HK Verma
Journal of Information Assurance and Security, USA 5 (4), 319-326, 2010
102010
Random sample audio watermarking algorithm for compressed wave files
H Verma, R Kaur, R Kumar
International Journal of Computer Science and Network Security 9 (11), 283-287, 2009
102009
Machine Learning for Malware Detection on Balanced and Imbalanced Datasets
M Goyal, R Kumar
2020 International Conference on Decision Aid Sciences and Application (DASA …, 2020
92020
Cryptanalysis of Protocol for Enhanced Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography for Known Signers
R Kumar
In: Margret Anouncia S., Wiil U. (eds) Knowledge Computing and Its …, 2018
92018
The obligatory of an Algorithm for Matching and Predicting Crime - Using Data Mining Techniques
A Sharma, R Kumar
International Journal of Computer Science and Technology, IJCST 4 (2), 289-292, 2013
92013
Information Technology Empowers by Women
R Kumar, R Kochher
International Journal of Science and Emerging Trends with latest Trends …, 2011
92011
The system can't perform the operation now. Try again later.
Articles 1–20