Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database MP Singh, S Sural, J Vaidya, V Atluri Computers & security 86, 183-205, 2019 | 21 | 2019 |
Secure similarity based document retrieval system in cloud GN Gopal, MP Singh 2012 International Conference on Data Science & Engineering (ICDSE), 154-159, 2012 | 11 | 2012 |
An improved approach towards network forensic investigation of HTTP and FTP protocols T Manesh, B Brijith, MP Singh International Conference on Parallel Distributed Computing Technologies and …, 2011 | 11 | 2011 |
Anonymity and verifiability in multi-attribute reverse auction TR Srinath, MP Singh, AR Pais arXiv preprint arXiv:1109.0359, 2011 | 11 | 2011 |
Security analysis of unified access control policies MP Singh, S Sural, V Atluri, J Vaidya Secure Knowledge Management In Artificial Intelligence Era: 8th …, 2020 | 8 | 2020 |
Simplified AES for low memory embedded processors SJ Manangi, P Chaurasia, MP Singh Global J. Comp. Comp. Sci. Technol 10 (14), 7-11, 2010 | 8 | 2010 |
A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis MP Singh, S Sural, J Vaidya, V Atluri Information Systems Frontiers, 1-18, 2021 | 7 | 2021 |
Managing multi-dimensional multi-granular security policies using data warehousing MP Singh, S Sural, V Atluri, J Vaidya, U Yakub Network and System Security: 9th International Conference, NSS 2015, New …, 2015 | 7 | 2015 |
ARBAC: Attribute-enabled role based access control model MP Singh, S Sudharsan, M Vani Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018 …, 2019 | 5 | 2019 |
AHCSABAC: Attribute value hierarchies and constraints specification in attribute-based access control MP Singh 2016 14th Annual Conference on Privacy, Security and Trust (PST), 35-41, 2016 | 5 | 2016 |
A novel reversible data embedding method for source authentication and tamper detection of H. 264/AVC video S Maiti, M Pratap Singh International Conference on Information Processing, 349-355, 2011 | 5 | 2011 |
A noble reversible data embedding method for source authentication and tamper detection of H. 264/AVC video S Maiti, MP Singh 2011 International Conference on Emerging Trends in Networks and Computer …, 2011 | 3 | 2011 |
bFLEX-: A Lightweight Block Cipher Utilizing Key Cross Approach via Probability Density Function AK Das, N Kar, S Deb, MP Singh Arabian Journal for Science and Engineering 47 (8), 10563-10578, 2022 | 2 | 2022 |
Portable Executable Header Based Ransomware Detection using Power Iteration and Artificial Neural Network MP Singh, Y Karkhur 2023 6th International Conference on Information Systems and Computer …, 2023 | 1 | 2023 |
Network Dominating Attack Detection and Mitigation J Johny, MP Singh 2018 Conference on Information and Communication Technology (CICT), 1-5, 2018 | 1 | 2018 |
Correction of Distortion for Images of Printed Materials. MP Singh, R Venkatesan IMECS, 578-582, 2007 | 1 | 2007 |
Role of Access Control in Information Security: A Security Analysis Approach MP Singh Information Security and Privacy in the Digital World-Some Selected Topics, 2023 | | 2023 |
Artificial Intelligence-Based Model for Detecting Inappropriate Content on the Fly A Ranjan, Pintu, V Kumar, MP Singh International Conference on Frontiers of Intelligent Computing: Theory and …, 2022 | | 2022 |
A reverse sealed-bid auction system for mobile commerce MP Singh, S Kella | | 2012 |
Remote scan using secure automated client server model V Gogikaru, M Pratap Singh International Conference on Information Processing, 476-481, 2011 | | 2011 |