Follow
Prof. Rajendra Kumar
Prof. Rajendra Kumar
Jamia Millia Islamia (A Central University), New Delhi
Verified email at jmi.ac.in
Title
Cited by
Cited by
Year
A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem
SKP Vinod Kumar, Rajendra Kumar
Journal of King Saud University – Computer and Information Sciences, 2018
42*2018
Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups
SK Kumar, V., Kumar, R. & Pandey
International Journal of Information Technology, 2018
21*2018
Mitigating the Authentication Vulnerabilities in Web Applications through Security Requirements
R Kumar
World Congress On Information and Communication Technologies (WICT 2011), 2011
172011
Effect of Training functions of Artificial Neural Networks (ANN) on Time series Forecasting
RAR Kumar
International Journal of Computer Applications 109 (3), 14-17, 2015
162015
Security in Coding Phase of SDLC
R Kumar, SK Pandey, SI Ahson
Third IEEE International Conference on Wireless Communications and Sensor …, 2007
142007
A Comprehensive Review of Numerical Weather Prediction Models
RK Rashi Aggarwal
International Journal of Computer Applications 74 (18), 44-48, 2013
132013
Cryptographic construction using coupled map lattice as a diffusion model to enhanced security
SK Subodh kumar, Rajendra kumar, Sushil kumar
Journal of Information Security and Applications 19 (46), 70-83, 2019
12*2019
Secure Intrusion Detection System for Mobile Adhoc Networks
TS Bharati, R Kumar
Proceedings of the 9th INDIACom; IEEE Conference ID: 35071, Delhi, INDIA …, 2015
92015
INTRUSION DETECTION SYSTEM FOR MANET USING MACHINE LEARNING AND STATE TRANSITION ANALYSIS
TS Bharati, R Kumar
International Journal of Computer Engineering & Technology (IJCET) 6 (12), 1-8, 2015
72015
Security Requirements Development Framework (SRDF)
R Kumar, M K
International Journal of Advanced Research in Computer Science 2 (5), 2011
42011
Elicitation and Structured Representation Modeling of Security Requirements for Authentication Vulnerabilities in web Applications
R Kumar
International Journal of Advanced Research in Computer Science and Software …, 2012
2*2012
Security Requirements and related Developments
R Kumar, K Mustafa
International Journal of Advanced Computing (IJAC) 2 (1), 18-25, 2010
12010
An Enhanced and Secured RSA Public Key Cryptosystem Algorithm Using Chinese Remainder Theorem
SK Kumar, V., Kumar, R. & Pandey
third International Conference, NGCT 2017, Smart and Innovative Trends in …, 2017
2017
Secure Error Handling and Reporting (ErHaR) in Web Applications
R Kumar
International Conference on Technological Advancement and Research, GOA, INDIA, 2013
2013
Reducing the Impact of Code Injection Vulnerabilities for Cloud Offerings
R kumar
International Journal of Advanced Research in Computer Science and Software …, 2013
2013
Revisiting Security Vulnerabilities: Web Applications Perspective
R Kumar
International Journal of Advanced Research in Computer Science and Software …, 2013
2013
Information Security in the Academia
R Kumar, SK Pandey
International Conference on Soft Computing and Intelligent Systems, 275-278, 2007
2007
Security as a Lifecycle Activity: Requirement Phase Perspective
R Kumar, SK Pandey
International Conference on Web Engineering and Applications (ICWA 2007), 87-94, 2007
2007
The system can't perform the operation now. Try again later.
Articles 1–18