Vikas Sejwar
Vikas Sejwar
MITS Gwalior
No verified email
Title
Cited by
Cited by
Year
Comparative study of routing protocols for mobile ad-hoc networks
P Suman, D Bisen, P Tomar, V Sejwar, R Shukla
International Journal of Information Technology & Knowledge Management 4 (1 …, 2009
222009
Sybil attack detection and analysis of energy consumption in cluster based sensor networks
S Saxena, V Sejwar
International Journal of Grid and Distributed Computing 7 (5), 15-30, 2014
102014
Impementation of QR code based secure system for information sharing using Matlab
S Sharma, V Sejwar
2016 8th International Conference on Computational Intelligence and …, 2016
82016
QR code steganography for multiple image and text hiding using improved RSA-3DWT algorithm
S Sharma, V Sejwar
International Journal of Security and Its Applications 10 (7), 393-406, 2016
62016
Improved Trust Based Routing Mechanism in DSR Routing Protocol in MANETs
MP India
International Journal of Future Generation Communication and Networking 8 (1 …, 2015
42015
Crime identification using FP-growth and multi objective particle swarm optimization
S Agrawal, V Sejwar
2017 International Conference on Trends in Electronics and Informatics (ICEI …, 2017
32017
Effect on throughput due to changes in transmission power of nodes in MANETs
K Agarwal, V Sejwar
International Journal of Future Generation Communication and Networking 8 (3 …, 2015
32015
Optimized noisy image segmentation using genetic algorithm
S Pathak, V Sejwar
2017 International Conference on Intelligent Computing and Control Systems …, 2017
22017
Frequent Pattern Model for Crime Recognition
S Agrawal, V Sejwar
International Journal of Computational Intelligence Research 13 (6), 1405-1417, 2017
22017
Implementation of Dempster-Shafer theory for trust based communication in MANET
G Batham, V Sejwar
International Journal of Computer Applications 150 (11), 2016
22016
Sybil Attack Detection through TDOA-Based Localization Method in Wireless Sensor Network
S Saxena, V Sejwar
22014
A Survey on E-Payment using Quantum and Visual Cryptography.
A Arele, V Sejwar
International Journal of Advanced Research in Computer Science 8 (5), 2017
12017
Avoidance of Hidden Terminal & Exposed terminal problem Using Directional MAC Protocol
K Agarwal, V Sejwar
International Journal of Future Generation Communication and Networking 8 (4 …, 2015
12015
A Survey On Security Using Encryption Techniques In Cloud
PG Scholar
2017
Detection and Prevention Techniques of Wormhole Attack-A Survey
DS Kachhwaha
Recent Trends in Parallel Computing 2 (2), 1-8, 2015
2015
Enhanced Online Payment Security using Steganography, Quantum and Visual Cryptography
A Arele, V Sejwar
Extensive Survey on Medium Access Control Protocol with Probable Problems
K Agarwal, V Sejwar
The system can't perform the operation now. Try again later.
Articles 1–17