Dr. Mrinal Kanti Sarkar
Dr. Mrinal Kanti Sarkar
University of Engineering and Management Jaipur
Verified email at iemcal.com - Homepage
Title
Cited by
Cited by
Year
Enhancing data storage security in cloud computing through steganography
MK Sarkar, T Chatterjee
International Journal on Network Security 5 (1), 13, 2014
262014
ACAFP: Asymmetric key based cryptographic algorithm using four prime numbers to secure message communication. A review on RSA algorithm
P Chaudhury, S Dhang, M Roy, S Deb, J Saha, A Mallik, S Bal, S Roy, ...
2017 8th Annual Industrial Automation and Electromechanical Engineering …, 2017
202017
A framework to ensure data storage security in cloud computing
MK Sarkar, S Kumar
2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile …, 2016
142016
Reverse engineering: An analysis of static behaviors of object oriented programs by extracting UML class diagram
MK Sarkar, T Chatterjee, D Mukherjee
International Journal of Advanced Computer Research 3 (3), 135, 2013
122013
Data storage security in cloud computing using container clustering
RR Gupta, G Mishra, S Katara, A Agarwal, MK Sarkar, R Das, S Kumar
2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile …, 2016
92016
HTMS: fuzzy based hierarchical trust management scheme in WSN
R Das, D Dash, MK Sarkar
Wireless Personal Communications, 1-34, 2020
72020
Ensuring data storage security in cloud computing based on hybrid encryption schemes
MK Sarkar, S Kumar
2016 fourth international conference on parallel, distributed and grid …, 2016
72016
Performance analysis of various attacks under AODV in WSN & MANET using OPNET 14.5
R Das, S Bal, S Das, MK Sarkar, D Majumder, A Chakraborty, K Majumder
2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile …, 2016
72016
Reverse engineering: An analysis of dynamic behavior of object oriented programs by extracting UML interaction diagram
MK Sarkar, T Chaterjee
International Journal of Computer Technology and Applications 4 (3), 378, 2013
72013
KT3F: A Key-Based Two-Tier Trust Management Filtering Scheme for Intrusion Detection in Wireless Sensor Network
M Singh, R Das, MK Sarkar, K Majumder, SK Sarkar
Proceedings of the Second International Conference on Computer and …, 2016
32016
Dr. VS Dhaka, Steganographic Approach to Ensure Data Storage Security in Cloud Computing Using Huffman Coding (SAHC)
T Chatterjee, MK Sarkar
JCSN International Journal of Computer Science and Network 4 (2), 2015
22015
Steganographic Approach to Ensure Data Storage Security in Cloud Computing Using Huffman Coding (SAHC)
T Chatterjee, MK Sarkar, VS Dhaka
IJCSN International Journal of Computer Science and Network 4 (2), 198-207, 2015
22015
A survey on data storage security issues in cloud computing
MK Sarkar, S Kumar
Int. J. Appl. Eng. Res 13 (10), 8390-8406, 2018
12018
LTC: A Location Based Cluster Head Selection Scheme in Wireless Sensor Network
SK Rupayan Das, M. K Sarkar, M. Singh
2018 IEEE 12th INDIACom International Conference on Computing for …, 2019
2019
Analysis of Data Storage Security issues in Cloud Computing using Hybrid Encryption Scheme
SK Mrinal Kanti Sarkar
International Journal of Advancement in Engineering, Management & Applied …, 2018
2018
Star Topology Implementation For Wireless Sensor Network: An Approach
SK Md Jamil Moatasimbillah, Nabanit Saha, Ratul Dey,M. K Sarkar
2018 IEEE 12th INDIACom International Conference on Computing for …, 2018
2018
A Symmetric Key Based Framework for Data Security in Cloud Computing
MK Sarkar, VS Dhaka, R Das
International Journal of Advanced Networking and Applications, 2015
2015
Sixth Sense Technology Has Potential to Become the Ultimate "Transparent" User Interface for Accessing Information about Everything Around Us
T Chatterjee, MK Sarkar
International Journal of Report and Opinion 5 (4), 1-7, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–18