Security analysis of elliptic curve cryptography and RSA D Mahto, DA Khan, DK Yadav Proceedings of the world congress on engineering 1, 419-422, 2016 | 84 | 2016 |
Information technology in supply chain management DTN Varma, DA Khan Journal of Supply Chain Management Systems 3 (3), 2014 | 77 | 2014 |
Fuzzy compromised solution-based novel home appliances scheduling and demand response with optimal dispatch of distributed energy resources M Waseem, Z Lin, S Liu, Z Zhang, T Aziz, D Khan Applied Energy 290, 116761, 2021 | 73 | 2021 |
Level by level image compression-encryption algorithm based on quantum chaos map RK Singh, B Kumar, DK Shaw, DA Khan Journal of King Saud University-Computer and Information Sciences 33 (7 …, 2021 | 43 | 2021 |
Cloud-based zero trust access control policy: an approach to support work-from-home driven by COVID-19 pandemic S Mandal, DA Khan, S Jain new generation computing 39 (3), 599-622, 2021 | 42 | 2021 |
A Study of security threats in cloud: Passive impact of COVID-19 pandemic S Mandal, DA Khan 2020 International Conference on Smart Electronics and Communication (ICOSEC …, 2020 | 41 | 2020 |
A modified approach to data hiding in Microsoft Word documents by change-tracking technique S Mahato, DA Khan, DK Yadav Journal of King Saud University-Computer and Information Sciences 32 (2 …, 2020 | 35 | 2020 |
A survey on advanced encryption standard SK Rao, D Mahto, DA Khan International Journal of Science and Research 6 (1), 711-724, 2017 | 29 | 2017 |
The AES-256 Cryptosystem Resists Quantum Attacks DAK Sandeep Kumar Rao, Dindayal Mahto, Dilip Kumar Yadav International Journal of Advanced Research in Computer Science 8 (3), 404-408, 2017 | 25 | 2017 |
The AES-256 Cryptosystem Resists Quantum Attacks SK Rao, D Mahto, DK Yadav, DA Khan International Journal of Advanced Research in Computer Science 8 (3), 404-408, 2017 | 25 | 2017 |
A novel approach to automate test data generation for data flow testing based on hybrid adaptive PSO-GA algorithm S Kumar, DK Yadav, DA Khan International Journal of Advanced Intelligence Paradigms 9 (2-3), 278-312, 2017 | 24 | 2017 |
A modified approach to text steganography using HyperText markup language S Mahato, DK Yadav, DA Khan 2013 Third International Conference on Advanced Computing and Communication …, 2013 | 23 | 2013 |
Cloud-CoCoSo: cloud model-based combined compromised solution model for trusted cloud service provider selection S Mandal, DA Khan Arabian Journal for Science and Engineering 47 (8), 10307-10332, 2022 | 22 | 2022 |
A novel approach to text steganography using font size of invisible space characters in microsoft word document S Mahato, DK Yadav, DA Khan Intelligent Computing, Networking, and Informatics: Proceedings of the …, 2014 | 22 | 2014 |
A resonant damping control and analysis for LCL-type grid-connected inverter D Khan, P Hu, S Habib, M Waseem, Z Lin, EM Ahmed Energy Reports 8, 911-928, 2022 | 21 | 2022 |
An impact of linear regression models for improving the software quality with estimated cost AK Marandi, DA Khan Procedia Computer Science 54, 335-342, 2015 | 21 | 2015 |
A minesweeper game-based steganography scheme S Mahato, DK Yadav, DA Khan Journal of Information Security and Applications 32, 1-14, 2017 | 19 | 2017 |
Fraud detection in supply chain using benford distribution DTN Varma, DA Khan International Journal of Research in management 5 (2), 2012 | 18 | 2012 |
Design and performance evaluation of a step-up DC–DC converter with dual loop controllers for two stages grid connected PV inverter MYA Khan, H Liu, S Habib, D Khan, X Yuan Sustainability 14 (2), 811, 2022 | 17 | 2022 |
A tidal island model for carbonate sedimentation: Karondia Limestone of Cretaceous Narmada basin, India K Akhtar, DA Khan Geological Society of India 50 (4), 481-489, 1997 | 16 | 1997 |