Developing university ontology using protégé owl tool: Process and reasoning N Malviya, N Mishra, S Sahu International Journal of Scientific & Engineering Research 2 (9), 1-8, 2011 | 56 | 2011 |
Enhanced cost231 wi Propagation model in wireless network HK Sharma, S Sahu, S Sharma International Journal of Computer Applications 19 (6), 36-42, 2011 | 40 | 2011 |
Enhanced transmission power control mechanism based on RSSI for MANET DR Gautam, S Sharma, S Sahu International Journal of Computer Applications 28 (1), 25-30, 2011 | 20 | 2011 |
Performance analysis of DYMO, LANMAR, STAR routing protocols for grid placement model with varying network size H Shakywar, S Sharma, S Sahu International Journal of Computer Technology and Applications 2 (6), 2011 | 8 | 2011 |
Images enhancement with brightness preserving using MRHRBFN NS Bagri, S Sharma, S Sahu International Journal of Computer Applications 40 (7), 22-26, 2012 | 4 | 2012 |
Efficient flooding for a large sensor networks using network coding N Jain, S Sharma, S Sahu International Journal of Computer Applications 30 (9), 1-4, 2011 | 4 | 2011 |
Performance Analysis of Routing Protocols Based on IPV4 and IPV6 for MANET KK Chandel, S Sharma, S Sahu Int J Comput Technol Electron Eng 2, 126-132, 2012 | 3 | 2012 |
A New Approach 160-bit Message Digest Algorithm PN Sallam, J Agrawal, S Sahu International Journal of Computer Applications 38 (5), 0975-8887, 2012 | 3 | 2012 |
Accumulating path information in AODV for Ad-hoc network R Thakur, S Sharma, S Sahu 2011 International Conference on Computational Intelligence and …, 2011 | 3 | 2011 |
Secure and proficient cross layer (SPCL) QoS framework for mobile ad-hoc network. S Sahu, S Sharma International Journal of Electrical & Computer Engineering (2088-8708) 9 (4), 2019 | 2 | 2019 |
Msmet: A Modified & Secure Multilanguage Encryption Technique AK Srivastava, S Sharma, S Sahu International Journal on Computer Science and Engineering 4 (3), 402, 2012 | 2 | 2012 |
Securing OLSR and STAR Routing Protocols Against Packet Dropping by Malicious Nodes H Shakywar, S Sharma, S Sahu International Journal of Computer Applications 35 (3), 7-12, 2011 | 2 | 2011 |
Secure AODV using Symmetric Key Cryptography with Cyclic Chain Hash Function (CCHF) S Singh, S Sharma, S Sahu International Journal of Computer Applications 47 (18), 2012 | 1 | 2012 |
Optimizing Memory Space by Removing Duplicate Files Using Similarity Digest Technique V Sharma, P Sharma, S Sahu Social Networking and Computational Intelligence, 791-797, 2020 | | 2020 |
Neuro Fuzzy Based Dynamic Secure Routing Protocol for QoS Frameworks of MANET S Sahu, S Sharma | | 2019 |
Efficient Decentralized Key Management Approach for Vehicular Ad Hoc Network S Rathore, J Agrawal, S Sharma, S Sahu Data, Engineering and Applications, 147-161, 2019 | | 2019 |
Hybrid KP-ABE Algorithm with Time Bounded Access Control for Cloud Data Security. B Dahat, N Mishra, S Sahu International Journal of Computer Network & Information Security 10 (11), 2018 | | 2018 |
Analysis of Security threats and Vulnerability Issues in QoS Frameworks of MANET SS Santosh sahu International Journal of Research in Electronics AND Computer Engineering …, 2018 | | 2018 |
Real Time Twitter Sentiment Analysis For Product Reviews P Pateriya, R Agrawal, S Sahu, S Goyal http://www.j-asc.com/gallery/29-june-785.pdf, 2018 | | 2018 |
A Survey: Data Security Encryption Scheme over Cloud Storage D Soni, N Mishra, Santosh Sahu International Journal of Computer Science and Network 5 (1), 17-22, 2016 | | 2016 |