Attacks and challenges in wireless sensor networks AG Dinker, V Sharma 2016 3rd International Conference on Computing for Sustainable Global …, 2016 | 15 | 2016 |
Trivariate polynomial based key management scheme (TPB-KMS) in hierarchical wireless sensor networks AG Dinker, V Sharma Ambient Communications and Computer Systems: RACCCS 2017, 283-290, 2018 | 9 | 2018 |
Comparison of the MAC protocols in vehicular ad-hoc network N Shukla, P Katiyar, N Devgan, N Kumar, AG Dinker Int. J. Adv. Res. Electr. Electron. Instrum. Eng 3 (5), 9543-9548, 2014 | 9 | 2014 |
Polynomial and matrix based key management security scheme in wireless sensor networks AG Dinker, V Sharma Journal of Discrete Mathematical Sciences and Cryptography 22 (8), 1563-1575, 2019 | 8 | 2019 |
Multilevel authentication scheme for security critical networks AG Dinker, V Sharma, Mansi, N Singh Journal of Information and Optimization Sciences 39 (1), 357-367, 2018 | 7 | 2018 |
Security in vehicular ad hoc network by using multiple operating channels N Shukla, AG Dinker, N Srivastava, A Singh 2016 3rd International Conference on Computing for Sustainable Global …, 2016 | 6 | 2016 |
Performance analysis of enhanced mobility model in cloud computing A Vrat, M Sachan, AG Dinker, D Arora, A Vaish, S Venkatesan 2011 International Conference on Recent Trends in Information Technology …, 2011 | 5 | 2011 |
Enhancement of Reliability in Object-Oriented Software Reliability Model AGD al. International Journal of Advanced Research in Computer Science and Software …, 2014 | 4 | 2014 |
Sensor Network Security AGDV Sharma Energy Efficient Wireless Sensor Networks 1, 179-212, 2017 | 2* | 2017 |
An approach for enhance the software quality based on quality model BB Rohila, AG Dinker Int. J. Emerg. Technol. Adv. Eng 4 (1), 2014 | 2 | 2014 |
Polynomial based key management security schemes in wireless sensor networks: A review AG Dinker, V Sharma Communication and Computing Systems, 272-278, 2019 | | 2019 |
Moderating Bandwidth Starvation Using PQDWRR A Singh, A Yadav, AG Dinker Next-Generation Networks: Proceedings of CSI-2015, 51-58, 2018 | | 2018 |
Blackhole Attack Mitigation Schemes in Wireless Sensor Aarti Gautam Dinker et al. IJAESTR 3 (1), 2015 | | 2015 |
Moderating Bandwidth Starvation Using PQDWRR AGD al. CSI-2015 50th Golden Jubilee Annual Convention on Digital Life, 2015 | | 2015 |
Improving Testing Architecture for MVC Based Architecture AGD al. ”, International Journal of Advanced Research in Computer Science and …, 2014 | | 2014 |
PERFORMANCE ANALYSIS OF QOS PARAMETERS IN UMTS NETWORK P Bhati, AG Dinker HANDBOOK OF MANAGEMENT, TECHNOLOGY AND SOCIAL SCIENCES, 2013 | | 2013 |
AN ENHANCE OF SOFTWARE QUALITY MODEL FOR ORGANIZATIONS A Yadav, AG Dinker HANDBOOK OF MANAGEMENT, TECHNOLOGY AND SOCIAL SCIENCES, 2013 | | 2013 |
SOFTWARE RELIABILITY MODELING AND EVALUATION UNDER CLASS LABEL DEFECTS A Kumar, AG Dinker HANDBOOK OF MANAGEMENT, TECHNOLOGY AND SOCIAL SCIENCES, 2013 | | 2013 |