A proposed novel architecture for information hiding in image steganography by using genetic algorithm and cryptography P Sethi, V Kapoor Procedia Computer Science 87, 61-66, 2016 | 52 | 2016 |
A Hybrid Cryptography Technique for Improving Network Security R Yadav, V Kapoor LAP LAMBERT Academic Publishing LAP LAMBERT Academic Publishing, 2016 | 36* | 2016 |
A hybrid cryptography technique for improving network security V Kapoor, R Yadav International Journal of Computer Applications 141 (11), 25-30, 2016 | 36 | 2016 |
An empirical study of the role of control parameters of genetic algorithms in function optimization problems V Kapoor, S Dey, AP Khurana International Journal of Computer Applications 31 (6), 20-26, 2011 | 19 | 2011 |
A review on security mechanism of Bluetooth communication T Panse, V Kapoor International Journal of Computer Science and Information Technologies 3 (2 …, 2012 | 17 | 2012 |
Secure communication using RSA algorithm for network environment A Jain, V Kapoor International Journal of Computer Applications 118 (7), 6-9, 2015 | 14 | 2015 |
Emerging security algorithms and techniques K Ahmad, MN Doja, NI Udzir, MP Singh CRC Press, 2019 | 13 | 2019 |
Genetic algorithm: an application to technical trading system design V Kapoor, S Dey, AP Khurana International Journal of Computer Applications 36 (5), 44-50, 2011 | 12 | 2011 |
Modeling the influence of world stock markets on Indian NSE index V Kapoor, S Dey, AP Khurana Journal of Statistics and Management Systems 23 (2), 249-261, 2020 | 11 | 2020 |
Secure and efficient data privacy, authentication and integrity schemes using hybrid cryptography S Bhat, V Kapoor International Conference on Advanced Computing Networking and Informatics …, 2019 | 11 | 2019 |
A hybrid cryptography technique to support cyber security infrastructure V Kapoor, R Yadav International Journal of Advanced Research in Computer Engineering …, 2015 | 11 | 2015 |
An enhanced LSB based video steganographic system for secure and efficient data transmission V Kapoor, A Mirza International Journal of Computer Applications 121 (10), 2015 | 11 | 2015 |
Empirical analysis and random respectful recombination of crossover and mutation in genetic algorithms V Kapoor, S Dey, AP Khurana International Journal of Computer Applications. Special issue on …, 2010 | 11 | 2010 |
Competing secure text encryption in intranet using elliptic curve cryptography A Kumari, V Kapoor Journal of Discrete Mathematical Sciences and Cryptography 23 (2), 631-641, 2020 | 8 | 2020 |
A new cryptography algorithm with an integrated scheme to improve data security V Kapoor International Journal of Scientific Research in Network Security and …, 2013 | 8 | 2013 |
Hybrid cryptographic technique to secure data in web application N Gupta, V Kapoor Journal of Discrete Mathematical Sciences and Cryptography 23 (1), 125-135, 2020 | 7 | 2020 |
Novel hybrid cryptography for confidentiality, integrity, authentication A Jain, V Kapoor Int. J. Comput. Appl 171 (August), 2017 | 7 | 2017 |
A Review on Key Agreement Protocols used in Bluetooth Standard and Security Vulnerabilities in Bluetooth Transmission T Panse, V Kapoor, P Panse International Journal of Information and Communication Technology Research 2 …, 2012 | 6 | 2012 |
An Integrated Scheme based on Triple DES, RSA and MD5 to Enhance the Security in Bluetooth Communication T Panse, V Kapoor International Journal of Computer Applications 50 (7), 2012 | 6 | 2012 |
Digit recognition system by using Back propagation algorithm V Kapoor, P Gupta International Journal of Computer Applications 83 (8), 2013 | 5 | 2013 |