Follow
Dr Santosh K Pandey
Dr Santosh K Pandey
Department of Electronics and IT, Ministry of Communications and IT, Govt. of India
No verified email
Title
Cited by
Cited by
Year
A comparative study of cloud security ontologies
V Singh, SK Pandey
Proceedings of 3rd International Conference on Reliability, Infocom …, 2014
1112014
Revisiting requirements elicitation techniques
S Sharma, SK Pandey
International Journal of Computer Applications 75 (12), 2013
1012013
Requirements elicitation: Issues and challenges
S Sharma, SK Pandey
2014 international conference on computing for sustainable global …, 2014
622014
Software security rules, SDLC perspective
C Banerjee, SK Pandey
arXiv preprint arXiv:0911.0494, 2009
472009
A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem
V Kumar, R Kumar, SK Pandey
Journal of King Saud University-Computer and Information Sciences 32 (9 …, 2020
422020
A comparative study of risk assessment methodologies for information systems
SK Pandey
Bulletin of Electrical Engineering and Informatics 1 (2), 111-122, 2012
402012
Research on software security awareness: problems and prospects
C Banerjee, SK Pandey
ACM SIGSOFT Software Engineering Notes 35 (5), 1-5, 2010
312010
Formal methods in requirements phase of SDLC
SK Pandey, M Batra
International Journal of Computer Applications 70 (13), 7-14, 2013
262013
Revisiting security ontologies
V Singh, SK Pandey
International Journal of Computer Science Issues (IJCSI) 11 (6), 150, 2014
242014
Fully homomorphic encryption scheme with probabilistic encryption based on Euler’s theorem and application in cloud computing
V Kumar, R Kumar, SK Pandey, M Alam
Big Data Analytics: Proceedings of CSI 2015, 605-611, 2018
222018
Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups
V Kumar, R Kumar, SK Pandey
International Journal of Information Technology 12 (1), 283-288, 2020
212020
Revisiting cloud security issues and challenges
V Singh, SK Pandey
International Journal of Advanced Research in Computer Science and Software …, 2013
202013
Integrating AI techniques in requirements phase: a literature review
S Sharma, SK Pandey
IJCA Proceedings on 4th International IT Summit Confluence, 21-25, 2013
192013
Research in cloud security: problems and prospects
V Singh, SK Pandey
International Journal of Computer Science Engineering and Information …, 2013
182013
Cloud security related threats
V Singh, SK Pandey
International Journal of Scientific & Engineering Research 4 (9), 2571, 2013
162013
A secure and robust group key distribution and authentication protocol with efficient rekey mechanism for dynamic access control in secure group communications
V Kumar, R Kumar, SK Pandey
International Journal of Communication Systems 33 (14), e4465, 2020
152020
LKM-AMI: a lightweight key management scheme for secure two way communications between smart meters and HAN devices of AMI system in smart grid
V Kumar, R Kumar, SK Pandey
Peer-to-Peer Networking and Applications 14 (1), 82-100, 2021
142021
An enhanced and secured RSA public key cryptosystem algorithm using Chinese remainder theorem
V Kumar, R Kumar, SK Pandey
Smart and Innovative Trends in Next Generation Computing Technologies: Third …, 2018
142018
Security in coding phase of SDLC
R Kumar, SK Pandey, SI Ahson
2007 Third International Conference on Wireless Communication and Sensor …, 2007
142007
Cloud computing: vulnerability and threat indications
V Singh, SK Pandey
Performance Management of Integrated Systems and its Applications in …, 2020
132020
The system can't perform the operation now. Try again later.
Articles 1–20