Name
Affiliation
Papers
PARDEEP KUMAR
Institute of Computer Science, Freie Universität Berlin, Berlin, Germany
54
Collaborators
Citations 
PageRank 
91
243
24.38
Referers 
Referees 
References 
630
1231
527
Search Limit
1001000
Title
Citations
PageRank
Year
Three stage fusion for effective time series forecasting using Bi-LSTM-ARIMA and improved DE-ABC algorithm00.342022
An Efficient Lightweight Privacy-Preserving Mechanism for Industry 4.0 Based on Elliptic Curve Cryptography00.342022
Planning in-hand dexterous micro-manipulation using 3-D rotations decomposition.00.342021
A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care70.502021
Detection of evil flies: securing air-ground aviation communication00.342021
SPIHT-based multiple image watermarking in NSCT domain20.372020
CT image denoising using NLM and its method noise thresholding10.362020
Crow-Penguin Optimizer For Multiobjective Task Scheduling Strategy In Cloud Computing10.352020
Blind noise estimation-based CT image denoising in tetrolet domain.00.342020
Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks.10.352019
Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks10.352019
E-Xy: An Entropy Based Xy Routing Algorithm00.342019
Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key Agreement00.342019
A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine.400.982018
Multiple Watermarking for Healthcare Applications.100.492018
Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images.40.392018
An efficient anonymous authentication protocol in multiple server communication networks (EAAM).00.342018
A recent survey on image watermarking techniques and its application in e-governance.130.492018
Trust and Thermal Aware Routing Protocol (TTRP) for Wireless Body Area Networks.10.362017
Hybrid OPC Technique for Fast and Accurate Lithography Simulation.00.342017
Optimal extra links placement in mesh interconnection network using improved environmental adaptation method.00.342017
Robust watermarking technique using back propagation neural network: a security protection mechanism for social applications.50.402017
CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things.20.382017
Novel secure VPN architectures for LTE backhaul networks20.422016
Performance and security evaluation of intra-vehicular communication architecture10.352016
The Quest for Privacy in the Internet of Things.130.602016
Secure and Efficient Automatic Ruling in Three-Level Network Architecture.00.342015
Implementation and Evaluation of AREA-MAC Protocol on the DES-Testbed Platform.00.342015
Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-Based Approach.10.352015
Proxy-Based End-To-End Key Establishment Protocol For The Internet Of Things40.412015
An efficient and simple key distribution scheme for smart environments00.342014
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications140.692014
Delegation-based robust authentication model for wireless roaming using portable communication devices00.342014
Pauthkey: A Pervasive Authentication Protocol And Key Establishment Scheme For Wireless Sensor Networks In Distributed Iot Applications210.792014
A Mobile Object-Based Secret Key Distribution Scheme for Wireless Sensor Networks10.372013
Certificate-Based Pairwise Key Establishment Protocol for Wireless Sensor Networks40.482013
Selection of evolutionary approach based hybrid data mining algorithms for decision support systems and business intelligence00.342012
A Benchmark to Select Data Mining Based Classification Algorithms For Business Intelligence And Decision Support Systems20.382012
Scheduling using improved genetic algorithm in cloud computing for independent tasks120.912012
A Strong User Authentication Framework for Cloud Computing.251.172011
Effective Ways of Secure, Private and Trusted Cloud Computing70.602011
A User Authentication for Healthcare Application Using Wireless Medical Sensor Networks40.532011
Optimizing Duty-Cycle for Delay and Energy Bound WSN Applications40.482010
Secure health monitoring using medical wireless sensor networks120.782010
TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption.20.382010
Addressing secure data routing scheme for heterogeneous sensor networks10.392010
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography50.452010
A secure ubiquitous sensor network with Dragon00.342009
A real-time and energy-efficient MAC protocol for wireless sensor networks.90.592009
DES-SERT: A framework for structured routing protocol implementation90.612009
  • 1
  • 2