A literature review of security threats to wireless networks U Kumar, S Gambhir International Journal of Future Generation Communication and Networking 7 (4 …, 2014 | 55 | 2014 |
A comprehensive review of straggler handling algorithms for mapreduce framework U Kumar, J Kumar International Journal of Grid and Distributed Computing 7 (4), 139-148, 2014 | 30 | 2014 |
Authentication protocols and techniques: a survey A Prakash, U Kumar Int. J. Comput. Sci. Eng 6 (6), 1014-1020, 2018 | 15 | 2018 |
Analysis and literature review of IEEE 802.1 x (Authentication) protocols U Kumar, P Kumar, S Gambhir International journal of Engineering and advanced Technology 3 (5), 163-168, 2014 | 13 | 2014 |
A Comparative Analysis of Different Encryption Algorithms: RSA, AES, DSS for Data Security ES Atwal, U Kumar Preprints, 2021 | 4 | 2021 |
Energy-efficient and secured mobile agent itinerary approach in wireless sensor network S Chaudhary, U Kumar, S Gambhir Innovations in Electrical and Electronic Engineering: Proceedings of ICEEE …, 2021 | 3 | 2021 |
Device fingerprint and Mobile agent based authentication technique in wireless networks U Kumar, S Gambhir Int J Fut Gen Comm Netw 11 (3), 33-48, 2018 | 3 | 2018 |
A novel approach for key distribution through fingerprint based authentication using mobile agent U Kumar, S Gambhir 2016 3rd International Conference on Computing for Sustainable Global …, 2016 | 3 | 2016 |
KDFBA: key distribution through fingerprint based authentication using mobile agent U Kumar, S Gambhir Multimedia Tools and Applications 79 (19), 13891-13918, 2020 | 2 | 2020 |
MABFWA: Mobile Agent Based Framework for Wireless Authentication U Kumar, S Gambhir 2018 8th International Conference on Cloud Computing, Data Science …, 2018 | 2 | 2018 |
Mobile Agent Based MapReduce Framework for Big Data Processing SG Umesh Kumar Advances in Intelligent Systems and Computing 654, 391-402, 2017 | 2* | 2017 |
Secured Authentication Method for Wireless Networks U Kumar, S Gambhir IOSR Journal of Computer Engineering, 1-11, 2015 | 2 | 2015 |
Prediction & Analysis of Covid-19 Cases Using Autoregressive Integrated Moving Average (Arima) U Kumar, H Kumar, A Gandhi International Journal of Intelligent Systems and Applications in Engineering …, 2023 | | 2023 |
LEPMA: Lightweight extensible authentication protocol based on mobile agent U Kumar International Journal of Management IT and Engineering 10 (1), 11-23, 2020 | | 2020 |
TWO FOLD SECURITY ON CLOUD CRM USING HASHING AND ROLE BASED SECURITY M Neeraj, U Kumar, S Gambhir Journal of Critical Reviews 7 (18), 1442-1456, 2020 | | 2020 |
Review and comparison of Mobile Agent Itinerary Planning Algorithms in WSN MG Shivani Chaudhary, Umesh Kumar International Journal of Computer Sciences and Engineering 7 (6), 209-219, 2019 | | 2019 |
Security Techniques in Mobile Agents: A Review Y Kumar, U Kumar, M Gambhir | | 2019 |