Follow
Mahendra Pratap Singh
Title
Cited by
Cited by
Year
Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database
MP Singh, S Sural, J Vaidya, V Atluri
Computers & security 86, 183-205, 2019
212019
Secure similarity based document retrieval system in cloud
GN Gopal, MP Singh
2012 International Conference on Data Science & Engineering (ICDSE), 154-159, 2012
112012
An improved approach towards network forensic investigation of HTTP and FTP protocols
T Manesh, B Brijith, MP Singh
International Conference on Parallel Distributed Computing Technologies and …, 2011
112011
Anonymity and verifiability in multi-attribute reverse auction
TR Srinath, MP Singh, AR Pais
arXiv preprint arXiv:1109.0359, 2011
112011
Security analysis of unified access control policies
MP Singh, S Sural, V Atluri, J Vaidya
Secure Knowledge Management In Artificial Intelligence Era: 8th …, 2020
82020
Simplified AES for low memory embedded processors
SJ Manangi, P Chaurasia, MP Singh
Global J. Comp. Comp. Sci. Technol 10 (14), 7-11, 2010
82010
A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis
MP Singh, S Sural, J Vaidya, V Atluri
Information Systems Frontiers, 1-18, 2021
72021
Managing multi-dimensional multi-granular security policies using data warehousing
MP Singh, S Sural, V Atluri, J Vaidya, U Yakub
Network and System Security: 9th International Conference, NSS 2015, New …, 2015
72015
ARBAC: Attribute-enabled role based access control model
MP Singh, S Sudharsan, M Vani
Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018 …, 2019
52019
AHCSABAC: Attribute value hierarchies and constraints specification in attribute-based access control
MP Singh
2016 14th Annual Conference on Privacy, Security and Trust (PST), 35-41, 2016
52016
A novel reversible data embedding method for source authentication and tamper detection of H. 264/AVC video
S Maiti, M Pratap Singh
International Conference on Information Processing, 349-355, 2011
52011
A noble reversible data embedding method for source authentication and tamper detection of H. 264/AVC video
S Maiti, MP Singh
2011 International Conference on Emerging Trends in Networks and Computer …, 2011
32011
bFLEX-: A Lightweight Block Cipher Utilizing Key Cross Approach via Probability Density Function
AK Das, N Kar, S Deb, MP Singh
Arabian Journal for Science and Engineering 47 (8), 10563-10578, 2022
22022
Portable Executable Header Based Ransomware Detection using Power Iteration and Artificial Neural Network
MP Singh, Y Karkhur
2023 6th International Conference on Information Systems and Computer …, 2023
12023
Network Dominating Attack Detection and Mitigation
J Johny, MP Singh
2018 Conference on Information and Communication Technology (CICT), 1-5, 2018
12018
Correction of Distortion for Images of Printed Materials.
MP Singh, R Venkatesan
IMECS, 578-582, 2007
12007
Role of Access Control in Information Security: A Security Analysis Approach
MP Singh
Information Security and Privacy in the Digital World-Some Selected Topics, 2023
2023
Artificial Intelligence-Based Model for Detecting Inappropriate Content on the Fly
A Ranjan, Pintu, V Kumar, MP Singh
International Conference on Frontiers of Intelligent Computing: Theory and …, 2022
2022
A reverse sealed-bid auction system for mobile commerce
MP Singh, S Kella
2012
Remote scan using secure automated client server model
V Gogikaru, M Pratap Singh
International Conference on Information Processing, 476-481, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–20