E-voting system using visual cryptography & secure multi-party computation PS Naidu, R Kharat, R Tekade, P Mendhe, V Magade 2016 International Conference on Computing Communication Control and …, 2016 | 40 | 2016 |
Secure authentication for online voting system SB Khairnar, PS Naidu, R Kharat 2016 International Conference on Computing Communication Control and …, 2016 | 17 | 2016 |
A modified location-dependent image encryption for mobile information system P Reddy, KR Sudha, S Naidu Int J Eng Sci 2, 1060-1065, 2010 | 11 | 2010 |
IBLIND Quantum Computing and HASBE for Secure Cloud Data Storage and Accessing. KK Singamaneni, PS Naidu Rev. d'Intelligence Artif. 33 (1), 33-37, 2019 | 10 | 2019 |
Efficient quantum cryptography technique for key distribution KK Singamaneni, PS Naidu, PVS Kumar J. Eur. Systèmes Autom 51, 283, 2018 | 10 | 2018 |
Secure workflow scheduling in cloud environment using modified particle swarm optimization with scout adaptation PS Naidu, B Bhagat International Journal of Modeling, Simulation, and Scientific Computing 9 …, 2018 | 10 | 2018 |
Secure key management in cloud environment using quantum cryptography. KK Singamaneni, P Naidu Ingénierie des Systèmes d'Information 23 (5), 2018 | 9 | 2018 |
An efficient quantum hash-based CP-ABE framework on cloud storage data KK Singamaneni, PS Naidu International Journal of Advanced Intelligence Paradigms 22 (3-4), 336-347, 2022 | 8 | 2022 |
Design and implementation of a strong and secure lightweight cryptographic hash algorithm using elliptic curve concept: SSLHA-160 BP Kosta, PS Naidu International Journal of Advanced Computer Science and Applications 12 (2), 2021 | 6 | 2021 |
Secure Authentication in Online Voting System Using Multiple Image Secret Sharing. PS Naidu, R Kharat SSCC, 336-343, 2016 | 6 | 2016 |
Investigation and analysis of Location Based Authentication and Security Services of Wireless LAN’s and Mobile Devices P Sanyasi, JG Naidu published in IJCA 146 (8), 12-17, 2016 | 6 | 2016 |
Emphasis on cloud optimization and security gaps: A literature review PS Naidu, B Bhagat Cybernetics and Information Technologies 17 (3), 165-185, 2017 | 4 | 2017 |
A Novel Approach to Database Confidentiality in Online Voting System P Sanyasi Naidu, R Kharat International Conference on Intelligent Computing and Applications: ICICA …, 2018 | 3 | 2018 |
Multi-factor Authentication Using Recursive XOR-Based Visual Cryptography in Online Voting System. PS Naidu, R Kharat SSCC, 52-62, 2016 | 3 | 2016 |
Particles swarm optimization techniques: principle, comparison & application PS NAIDU, B Bhagat, N Rathi International Journal of Computer Science Engineering and Information …, 2018 | 2 | 2018 |
Detection of Coronavirus from Chest X-ray Images Using 2D Convolutional Neural Network F Nausheen, PS Naidu Contactless Healthcare Facilitation and Commodity Delivery Management During …, 2022 | 1 | 2022 |
Lossless multiple image secret sharing scheme using XOR & additive modulo arithmetic SB Ovhal, R Kharat, PS Naidu 2017 International Conference on Computing, Communication, Control and …, 2017 | 1 | 2017 |
Secure Authentication in Online Voting System Using Multiple Image Secret Sharing P Sanyasi Naidu, R Kharat Security in Computing and Communications: 4th International Symposium, SSCC …, 2016 | 1 | 2016 |
Multi-factor Authentication Using Recursive XOR-Based Visual Cryptography in Online Voting System P Sanyasi Naidu, R Kharat Security in Computing and Communications: 4th International Symposium, SSCC …, 2016 | 1 | 2016 |
Secure Energy Trade-off Analysis in Wireless Ad-Hoc Networks using Novel Scalable & Secure Management Procedure S Chandolu, PS Naidu, S Sindhe International Journal of Recent Technology and Engineering (IJRTE) 8 (3 …, 0 | 1 | |