Homomorphic encryption for data security in cloud computing KK Chauhan, AKS Sanger, A Verma 2015 International conference on information technology (ICIT), 206-209, 2015 | 45 | 2015 |
Securing mobile Ad hoc networks: key management and routing KK Chauhan, AKS Sanger arXiv preprint arXiv:1205.2432, 2012 | 22 | 2012 |
Survey of Security threats and attacks in cognitive radio networks KK Chauhan, AKS Sanger 2014 International Conference on Electronics and Communication Systems …, 2014 | 19 | 2014 |
Securing on-demand source routing in MANETs KK Chauhan, AKS Sanger, VS Kushwah 2010 Second International Conference on Computer and Network Technology, 294-297, 2010 | 15 | 2010 |
The design of a secure key management system in vehicular ad hoc networks KK Chauhan, S Kumar, S Kumar 2017 conference on information and communication technology (CICT), 1-6, 2017 | 14 | 2017 |
A secure key management system in group structured mobile ad hoc networks KK Chauhan, S Tapaswi 2010 IEEE International Conference on Wireless Communications, Networking …, 2010 | 14 | 2010 |
Security in mobile ad hoc networks: Key management and secure routing protocol KK Chauhan, AKS Sanger International Journal on AdHoc Networking Systems (IJANS) 2 (2), 2012 | 2 | 2012 |
Key Management for Group Based Mobile Ad Hoc Networks KK Chauhan, AKS Sanger Advances in Computer Science and Information Technology. Computer Science …, 2012 | 2 | 2012 |
A comparative study of mobile Ad hoc network protocols for throughput, average end-to-end delay and jitter VS Kushwah, KK Chauhan, AKS Sanger International Journal of Computational Intelligence Research 6 (3), 385-393, 2010 | 2 | 2010 |
Cloud Security: Threats, Attacks and Mitigations KK Chuahan, AKS Sanger International Journal of Computer Science s and Engineering 6 (5), 473-478, 2018 | | 2018 |
Mobile Computing Security for Ad Hoc Networks Using Authentication VS Kushwah, AKS Sanger, KK Chauhan International Journal of Information & Communication Technologies 3 (3-4 …, 2010 | | 2010 |