Follow
Dr. Snehlata Yadav
Dr. Snehlata Yadav
MANIT(NIT-B), Bhopal and Government Women's Polytechnic College, Bhopal
Verified email at manit.ac.in
Title
Cited by
Cited by
Year
Privacy preserving data sharing method for social media platforms
S Yadav, N Tiwari
PloS one 18 (1), e0280182, 2023
92023
An Efficient and Secure Data Sharing Method Using Asymmetric Pairing with Shorter Ciphertext to Enable Rapid Learning in Healthcare
S Yadav, N Tiwari
Computational Intelligence and Neuroscience 2022, 2022
42022
Recent advancements in chaos-based image encryption techniques: a review
S Yadav, N Tiwari
Social Networking and Computational Intelligence: Proceedings of SCI-2018 …, 2020
32020
Design of Energy Efficient Scheme for Conducting Secure E-Class Application on MANET
E Verma, J Abraham, S Yadav
2009 First International Conference on Computational Intelligence …, 2009
32009
Secure and efficient online data sharing scheme using broadcast encryption with personalised message system
S Yadav, N Tiwari
22023
Message Passing Clustering Technique: A Review
S Yadav, D Singh
2015 International Conference on Computational Intelligence and …, 2015
12015
A Sustainable Blockchain and Asymmetric Broadcast Encryption-Based Secure E-Healthcare System
S Yadav, V Yadav
Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum …, 2024
2024
SYSTEM FOR HEALTH CARE RESOURCE MANAGEMENT IN HIGH DEMANDS FOR COVID PATIENTS USING INTERNET OF THINGS
PK Mannepalli, SK Gupta, P Khatri, S Patel, R Sisodiya, S Yadav, ...
AU Patent 2,021,102,715, 2022
2022
AN IMPROVISATION SYSTEM FOR COMPUTER NETWORK SECURITY BASED ON AN IOT AND BLOCK CHAIN
C Kaushal, N Hussain, O Ibrahim, K Cengiz, B Brahma, P Shukla, ...
AU Patent 2,021,104,769, 2021
2021
An Efficient Affinity Propagation Clustering Technique
S Yadav
Snehlata Yadav. (2020). An Efficient Affinity Propagation Clustering …, 2020
2020
Security issues in wireless sensor networks
SY K. Gupta, S. Silakari
Journal of Information Systems and Communication 1 (2), 01-06, 2010
2010
Semantic secure broadcast encryption schemes using asymmetric key cryptography
S Yadav
Bhopal, 0
The system can't perform the operation now. Try again later.
Articles 1–12