Hemraj Saini
Cited by
Cited by
Cyber-crimes and their impacts: A review
H Saini, YS Rao, TC Panda
International Journal of Engineering Research and Applications 2 (2), 202-209, 2012
Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments
M Fiskiran
2002 IEEE International Workshop on Workload Characterization, 127-137, 2002
A recent review on lightweight cryptography in IoT
ER Naru, H Saini, M Sharma
2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics …, 2017
A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology
G Rathee, A Sharma, H Saini, R Kumar, R Iqbal
Multimedia Tools and Applications, 1-23, 2019
Service level agreement assurance in cloud computing: a trust issue
SB Dash, H Saini, TC Panda, A Mishra
Cyber attack classification using game theoretic weighted metrics approach
BK Mishra, H Saini
World Applied Sciences Journal 7, 206-215, 2009
Proactive cyber defense and reconfigurable framework for cyber security
H Saini, D Saini
strategies 2, 3, 2007
VAIN: A Stochastic Model for Dynamics of Malicious Objects
DK Saini, H Saini
the ICFAI Journal of Systems Management 6 (1), 14-28, 2008
Various code clone detection techniques and tools: a comprehensive survey
P Gautam, H Saini
International Conference on Smart Trends for Information Technology and …, 2016
Malicious Object dynamics in the presence of Anti Malicious Software
H Saini, DK Saini
European Journal of Scientific Research ISSN, 491-499, 2005
Vm consolidation for cloud data center using median based threshold approach
O Sharma, H Saini
Procedia Computer Science 89, 27-33, 2016
E-Business System Development: review on method, design factors, techniques and tools with an extensive case study for secure online retail selling industry
H Saini, D Saini, N Gupta
Indian Journal of Science and Technology 2 (5), 2009
A Secure, Energy-and SLA-Efficient (SESE) E-Healthcare Framework for Quickest Data Transmission Using Cyber-Physical System
A Sharma, G Rathee, R Kumar, H Saini, V Varadarajan, Y Nam, ...
Sensors 19 (9), 2119, 2019
Novel noncommutative cryptography scheme using extra special group
G Kumar, H Saini
Security and communication networks 2017, 2017
Security concerns with open research issues of present computer network
G Rathee, H Saini
International Journal of Computer Science and Information Security 14 (4), 406, 2016
Efficient hybrid watermarking approach by using SVD, DWT, and Back Propagation Neural Network
H Saini
2014 IEEE International Advance Computing Conference (IACC), 985-990, 2014
Novel Noncommutative Cryptography Scheme Using Extra Special Group, Security and Communication Networks, Volume 2017, Article ID 9036382, 21 pages
G Kumar, H Saini
A trust computed framework for IoT devices and fog computing environment
G Rathee, R Sandhu, H Saini, M Sivaram, V Dhasarathan
Wireless Networks 26 (4), 2339-2351, 2020
Aspects of trusted routing communication in smart networks
G Rathee, H Saini, G Singh
Wireless Personal Communications 98 (2), 2367-2387, 2018
A Theoretical Aspect of Cloud Computing Service Models and Its Security Issues: A Paradigm
SB Dash, H Saini, TC Panda, A Mishra
The system can't perform the operation now. Try again later.
Articles 1–20