Follow
Smita Chaudhari
Smita Chaudhari
Assistant Professor
Verified email at dypvp.edu.in
Title
Cited by
Cited by
Year
A Comprehensive Survey on Public Auditing for Secure Cloud Storage
SKP Smita Chaudhari
International Journal of Engineering & Technology(UAE) 7 (2.7), 565-569, 2018
7*2018
Reviews of Load Balancing Based on Partitioning in Cloud Computing
SD More, S Chaudhari
International Journal of Computer Science and Information Technologies 5 (3), 2014
52014
Efficient and Secure Group based Collusion Resistant Public Auditing Scheme for Cloud Storage
GS Smita Chaudhari
International Journal of Advanced Computer Science and Applications 12 (3), 10, 2021
3*2021
Towards lightweight provable data possession for cloud storage using indistinguishability obfuscation
S Chaudhari, G Swain
IEEE Access 10, 31607-31625, 2022
22022
Secure and Verifiable Multi-Party Computation Using Indistinguishability Obfuscation
S Chaudhari, G Swain, P Mishra
International Journal of Intelligent Engineering and Systems 13 (5), 277-285, 2020
22020
Obtaining the Name aliases from the Web, using them to Cluster Text Documents with Cuckoo Algorithm and Comparing Results with K-Means Algorithm
P Deshpande, S Chaudhari
IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN, 2278-0661, 2014
22014
‘Geo-Encryption Lite’-A location based Encryption Application for Android
S Chaudhari, S Yangad, A Jha, A Surwase
Int. J. Comput. Appl 165 (4), 13-17, 2017
12017
Cloud data integrity and security preservation using improved cryptographic algorithms
SE Chaudhari
Vaddeswaram, 2022
2022
Privacy Preserving Dynamic Provable Data Possession with Batch Update for Secure Cloud Storage
GS Smita Chaudhari
International Journal of Advanced Computer Science and Applications 12 (6), 2021
2021
Bus Rapid Transit Customer Support System (BRTCSS)
SC Sanket T.Londhe, Tanvi Patil, Priyanka Bhosale
2nd IEEE International Conference on Human Computer Interactins (ICHCI'16), 6-11, 2016
2016
Time base Security and Accountability in Unreliable Cloud
SC Manda Shende
3 rd International Conference on Recent Trends in Engineering & Technology …, 2014
2014
Password Authentication Using Two Server Key Exchange
L Deshmukh, A Kathale, S Kulkarni, S Chaudhari
Discovering the Name aliases from the Web & using them to Cluster Text Documents
PP Deshpande, S Chaudhary
Security Management for Distributed Environment
MS Chaudhari, MS Kolkur
The system can't perform the operation now. Try again later.
Articles 1–14