Absolute public key cryptographic system and method surviving private-key compromise with other advantages C Shaik US Patent 7,088,821, 2006 | 138 | 2006 |
Password self encryption method and system and encryption by keys generated from personal secret information C Shaik US Patent 7,522,723, 2009 | 34 | 2009 |
Dynamic language text generation system and method C Shaik US Patent 7,721,222, 2010 | 31 | 2010 |
Codeless dynamic websites including general facilities C Shaik US Patent 7,770,122, 2010 | 26 | 2010 |
Password self encryption method and system and encryption by keys generated from personal secret information C Shaik US Patent 8,023,647, 2011 | 24 | 2011 |
Preventing Counterfeit Products using Cryptography, QR Code and Webservice C Shaik Computer Science & Engineering: An International Journal (CSEIJ) 11 (1), 1-11, 2021 | 19 | 2021 |
Securing cryptocurrency wallet seed phrase digitally with blind key encryption C Shaik International Journal on Cryptography and Information Security (IJCIS) 10 (4), 2020 | 7 | 2020 |
Robust Public Key Cryptography—A New Cryptosystem Surviving Private Key Compromise A Blyth, I Sutherland, C Shaik EC2ND 2006: Proceedings of the Second European Conference on Computer …, 2007 | 3 | 2007 |
Counter challenge authentication method: a defeating solution to phishing attacks C Shaik International Journal of Computer Science, Engineering and Applications …, 2020 | 2 | 2020 |
Password self encryption method and system and encryption by keys generated from personal secret information C Shaik US Patent 8,831,214, 2014 | 2 | 2014 |
EC2ND 2005 A Blyth Springer-Verlag London Limited, 2006 | 2* | 2006 |
Development of robust finite elements for general purpose structural analysis G Prathap, BP Naganarayana, BR Somashekar Sadhana 19, 289-309, 1994 | 2 | 1994 |
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATTACKS C Shaik IJCSEA 10 (1), 1 - 8, 0 | 2* | |
Preventing Forged and Fabricated Academic Credentials using Cryptography and QR Codes C Shaik International Journal of Computer Science, Engineering and Applications …, 2021 | 1 | 2021 |
Dark Energy Discriminant Theory C Shaik International Journal of Recent advances in Physics (IJRAP) Vol 12, 0 | 1 | |
Safe, Clean and Unbiased Elections with Encrypted QR Code Voter Cards C Shaik International Journal on Cryptography and Information Security ( IJCIS) 11 …, 2021 | | 2021 |
Unlimited Length Random Passwords for Exponentially Increased Security C Shaik International Journal of Computer Science, Engineering and Applications …, 2021 | | 2021 |
Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys C Shaik International Journal of Network Security & Its Applications (IJNSA) 13 (1 …, 2021 | | 2021 |
Defeating solution to phishing attacks through counter challenge authentication C Shaik US Patent 10,880,331, 2020 | | 2020 |
Unforgettable User Defined Seed Phrase for Cryptocurrency Wallets C Shaik International Journal on Cryptography and Information Security ( IJCIS) 10 …, 2020 | | 2020 |