Vikas Sejwar
Vikas Sejwar
MITS Gwalior
No verified email
TitleCited byYear
Comparative study of routing protocols for mobile ad-hoc networks
P Suman, D Bisen, P Tomar, V Sejwar, R Shukla
International Journal of Information Technology & Knowledge Management 4 (1 …, 2009
Sybil attack detection and analysis of energy consumption in cluster based sensor networks
S Saxena, V Sejwar
International Journal of Grid and Distributed Computing 7 (5), 15-30, 2014
QR Code Steganography for Multiple Image and Text Hiding using Improved RSA-3DWT Algorithm
S Sharma, V Sejwar
International Journal of Security and Its Applications 10 (7), 393-406, 2016
Frequent Pattern Model for Crime Recognition
S Agrawal, V Sejwar
International Journal of Computational Intelligence Research 13 (6), 1405-1417, 2017
Impementation of QR Code Based Secure System for Information Sharing Using Matlab
S Sharma, V Sejwar
Computational Intelligence and Communication Networks (CICN), 2016 8th …, 2016
Sybil Attack Detection through TDOA-Based Localization Method in Wireless Sensor Network
S Saxena, V Sejwar
A Survey on E-Payment using Quantum and Visual Cryptography
A Arele, V Sejwar
International Journal of Advanced Research in Computer Science 8 (5), 2017
Improved Trust Based Routing Mechanism in DSR Routing Protocol in MANETs
A Sahu, V Sejwar
International Journal of Future Generation Communication and Networking 8 (1 …, 2015
Avoidance of Hidden Terminal & Exposed terminal problem Using Directional MAC Protocol
K Agarwal, V Sejwar
International Journal of Future Generation Communication and Networking 8 (4 …, 2015
Optimized noisy image segmentation using genetic algorithm
S Pathak, V Sejwar
Intelligent Computing and Control Systems (ICICCS), 2017 International …, 2017
Crime identification using FP-growth and multi objective particle swarm optimization
S Agrawal, V Sejwar
Trends in Electronics and Informatics (ICEI), 2017 International Conference …, 2017
A Review on Image Segmentation Using Different Optimization Techniques
S Pathak, V Sejwar
A Survey On Security Using Encryption Techniques In Cloud
PG Scholar
Implementation of Dempster-Shafer Theory for Trust based Communication in MANET
G Batham, V Sejwar
International Journal of Computer Applications 150 (11), 2016
Detection and Prevention Techniques of Wormhole Attack-A Survey
DS Kachhwaha
Recent Trends in Parallel Computing 2 (2), 1-8, 2015
Extensive Survey on Medium Access Control Protocol with Probable Problems
K Agarwal, V Sejwar
The system can't perform the operation now. Try again later.
Articles 1–16