Follow
Danish Ali Khan
Title
Cited by
Cited by
Year
Security analysis of elliptic curve cryptography and RSA
D Mahto, DA Khan, DK Yadav
Proceedings of the world congress on engineering 1, 419-422, 2016
842016
Information technology in supply chain management
DTN Varma, DA Khan
Journal of Supply Chain Management Systems 3 (3), 2014
762014
Fuzzy compromised solution-based novel home appliances scheduling and demand response with optimal dispatch of distributed energy resources
M Waseem, Z Lin, S Liu, Z Zhang, T Aziz, D Khan
Applied Energy 290, 116761, 2021
712021
Level by level image compression-encryption algorithm based on quantum chaos map
RK Singh, B Kumar, DK Shaw, DA Khan
Journal of King Saud University-Computer and Information Sciences 33 (7 …, 2021
422021
Cloud-based zero trust access control policy: an approach to support work-from-home driven by COVID-19 pandemic
S Mandal, DA Khan, S Jain
new generation computing 39 (3), 599-622, 2021
412021
A Study of security threats in cloud: Passive impact of COVID-19 pandemic
S Mandal, DA Khan
2020 International Conference on Smart Electronics and Communication (ICOSEC …, 2020
412020
A modified approach to data hiding in Microsoft Word documents by change-tracking technique
S Mahato, DA Khan, DK Yadav
Journal of King Saud University-Computer and Information Sciences 32 (2 …, 2020
342020
A survey on advanced encryption standard
SK Rao, D Mahto, DA Khan
International Journal of Science and Research 6 (1), 711-724, 2017
292017
The AES-256 Cryptosystem Resists Quantum Attacks
DAK Sandeep Kumar Rao, Dindayal Mahto, Dilip Kumar Yadav
International Journal of Advanced Research in Computer Science 8 (3), 404-408, 2017
242017
The AES-256 Cryptosystem Resists Quantum Attacks
SK Rao, D Mahto, DK Yadav, DA Khan
International Journal of Advanced Research in Computer Science 8 (3), 404-408, 2017
242017
A novel approach to automate test data generation for data flow testing based on hybrid adaptive PSO-GA algorithm
S Kumar, DK Yadav, DA Khan
International Journal of Advanced Intelligence Paradigms 9 (2-3), 278-312, 2017
242017
A modified approach to text steganography using HyperText markup language
S Mahato, DK Yadav, DA Khan
2013 Third International Conference on Advanced Computing and Communication …, 2013
232013
A novel approach to text steganography using font size of invisible space characters in microsoft word document
S Mahato, DK Yadav, DA Khan
Intelligent Computing, Networking, and Informatics: Proceedings of the …, 2014
222014
Cloud-CoCoSo: cloud model-based combined compromised solution model for trusted cloud service provider selection
S Mandal, DA Khan
Arabian Journal for Science and Engineering 47 (8), 10307-10332, 2022
212022
An impact of linear regression models for improving the software quality with estimated cost
AK Marandi, DA Khan
Procedia Computer Science 54, 335-342, 2015
212015
A resonant damping control and analysis for LCL-type grid-connected inverter
D Khan, P Hu, S Habib, M Waseem, Z Lin, EM Ahmed
Energy Reports 8, 911-928, 2022
192022
A minesweeper game-based steganography scheme
S Mahato, DK Yadav, DA Khan
Journal of Information Security and Applications 32, 1-14, 2017
192017
Fraud detection in supply chain using benford distribution
DTN Varma, DA Khan
International Journal of Research in management 5 (2), 2012
182012
Design and performance evaluation of a step-up DC–DC converter with dual loop controllers for two stages grid connected PV inverter
MYA Khan, H Liu, S Habib, D Khan, X Yuan
Sustainability 14 (2), 811, 2022
162022
A tidal island model for carbonate sedimentation: Karondia Limestone of Cretaceous Narmada basin, India
K Akhtar, DA Khan
Geological Society of India 50 (4), 481-489, 1997
161997
The system can't perform the operation now. Try again later.
Articles 1–20