Anand Sharma
Anand Sharma
MUST, Lakshmangarh
Verified email at modyuniversity.ac.in
Title
Cited by
Cited by
Year
Visual cryptography improvises the security of tongue as a biometric in banking system
S Suryadevara, R Naaz, S Kapoor, A Sharma
2011 2nd International Conference on Computer and Communication Technology …, 2011
332011
Improve performance of extract, transform and load (ETL) in data warehouse
V Gour, SS Sarangdevot, GS Tanwar, A Sharma
International Journal on Computer Science and Engineering 2 (3), 786-789, 2010
292010
Implementation of cryptography for privacy preserving data mining
A Sharma, V Ojha
International Journal of Database Management Systems 2 (3), 57-65, 2010
252010
An automated recognition of fake or destroyed Indian currency notes in machine vision
M Sanjana, A Sharma
Int. J. Comput. Sci. Manag. Stud 12, 53-60, 2012
192012
Hiding sensitive association rules efficiently by introducing new variable hiding counter
RC Belwal, J Varshney, SA Khan, A Sharma, M Bhattacharya
2008 IEEE International Conference on Service Operations and Logistics, and …, 2008
172008
Password based authentication: Philosophical survey
A Sharma, RC Belwal, V Ojha, G Agarwal
2010 IEEE International Conference on Intelligent Computing and Intelligent …, 2010
132010
Tongue as a Biometric Visualizes New Prospects of Cloud Computing Security
S Suryadevara, S Kapoor, S Dhatterwal, R Naaz, A Sharma
Int Conf Inform Network Technol 4, 2011
102011
Security of entanglement based version of BB84 protocol for Quantum Cryptography
A Sharma, V Ojha, SK Lenka
2010 3rd International Conference on Computer Science and Information …, 2010
102010
Data compression scheme of dynamic Huffman code for different languages
S Pathak, S Singh, S Singh, M Jain, A Sharma
International Conference on Information and Network Technology Press …, 2011
72011
Limitations of practical quantum cryptography
V Ojha, A Sharma, V Goar, P Trivedi
Int. J. Comput. Trends Technol 1, 2011
72011
Security aspect of quantum key distribution
A Sharma, V Ojha, V Goar
Int. J. Computer Applications 2, 58-62, 2010
72010
Secure key agreement with rekeying using FLSO routing protocol in wireless sensor network
U Meena, A Sharma
Wireless Personal Communications 101 (2), 1177-1199, 2018
62018
Performance analysis of face detection by using Viola-Jones algorithm
J Kaur, A Sharma
International Journal of Computational Intelligence Research 13 (5), 707-717, 2017
62017
Authentication in online banking systems: quantum cryptography perspective
A Sharma, SK Lenka
Int. J. Engineering and Technology 5, 561-564, 2014
62014
Quantum cryptoyraphy: The concept and challenyes
A Sharma, V Goar, RH Belwal, V Ojha
2010 The 2nd International Conference on Computer and Automation Engineering …, 2010
62010
Vehicle Detection from Satellite Images in Digital Image Processing
NK Gill, A Sharma
International Journal of Computational Intelligence Research 13 (5), 697-705, 2017
52017
Noise Models and De-noising Techniques in Digital Image Processing
NK Gill, A Sharma
International Journal of Computer & Mathematical Sciences 5 (1), 21-25, 2016
52016
Authentication in online banking systems through quantum cryptography
A Sharma, SK Lenka
Int. J. Engineering and Technology 5, 2696-2700, 2013
52013
Advantages of Classical Cryptography Over the Quantum Cryptography
V Ojha, A Sharma, SK Lenka, SR Biradar
World Appl. Program 2 (5), 257-262, 2012
52012
Physical Access System Security of IoT Devices using Machine Learning Techniques
A Singla, A Sharma
Proceedings of International Conference on Sustainable Computing in Science …, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20