Key management for blockchain technology O Pal, B Alam, V Thakur, S Singh ICT express 7 (1), 76-80, 2021 | 137 | 2021 |
Real-world model for bitcoin price prediction RK Rathore, D Mishra, PS Mehra, O Pal, AS Hashim, A Shapi'i, T Ciano, ... Information Processing & Management 59 (4), 102968, 2022 | 35 | 2022 |
EETSP: Energy‐efficient two‐stage routing protocol for wireless sensor network‐assisted Internet of Things AK Dwivedi, PS Mehra, O Pal, MN Doja, B Alam International Journal of Communication Systems 34 (17), e4965, 2021 | 28 | 2021 |
Cryptographic key management for SCADA system: An architectural framework O Pal, S Saiwan, P Jain, Z Saquib, D Patel 2009 International conference on advances in computing, control, and …, 2009 | 22 | 2009 |
FD-YOLOv5: a fuzzy image enhancement based robust object detection model for safety helmet detection M Sadiq, S Masood, O Pal International Journal of Fuzzy Systems 24 (5), 2600-2616, 2022 | 20 | 2022 |
Cyber security risks and challenges in supply chain. O Pal, B Alam International Journal of Advanced Research in Computer Science 8 (5), 2017 | 14 | 2017 |
Public key cryptography based approach for securing SCADA communications A Saxena, O Pal, Z Saquib Computer Networks and Information Technologies: Second International …, 2011 | 12 | 2011 |
Diffie-Hellman key exchange protocol with entities authentication O Pal, B Alam International Journal Of Engineering And Computer Science 6 (4), 2017 | 11 | 2017 |
A new blockchain and fog computing model for blood pressure medical sensor data storage V Mani, MM Ghonge, NK Chaitanya, O Pal, M Sharma, S Mohan, ... Computers and Electrical Engineering 102, 108202, 2022 | 10 | 2022 |
Analysing the impact of COVID-19 pandemic on the psychological health of people using fuzzy MCDM methods S Ahmad, S Masood, NZ Khan, IA Badruddin, A Ahmadian, ZA Khan, ... Operations Research Perspectives 10, 100263, 2023 | 9 | 2023 |
Blockchain technology and it’s applications in e-governance services O Pal, S Singh International Journal of Recent Technology and Engineering (IJRTE) 8 (4 …, 2019 | 9 | 2019 |
Dual secure robust watermarking scheme based on hybrid optimization algorithm for image security S Alam, T Ahmad, MN Doja, O Pal Personal and Ubiquitous Computing, 1-13, 2021 | 8 | 2021 |
Efficient and secure key management for conditional access systems O Pal, B Alam IEEE Transactions on Consumer Electronics 66 (1), 1-10, 2019 | 8 | 2019 |
SCGKM: a secure and cost-effective group key management scheme for multicast communication in large dynamic groups V Kumar, O Pal, V Thakur, K Kumar International Journal of Information Technology 14 (2), 781-788, 2022 | 7 | 2022 |
Efficient and secure conditional access system for pay-TV systems O Pal, B Alam Multimedia Tools and Applications 78, 18835-18853, 2019 | 7 | 2019 |
How to report cyber crimes in Indian territory PT Ompall, B Alam Int J Sci Technol Manag 6 (04), 2394-1537, 2017 | 6 | 2017 |
A homomorphic encryption scheme over integers based on Carmichael's theorem PK Siddharth, O Pal, B Alam 2016 International Conference on Electrical, Electronics, Communication …, 2016 | 6 | 2016 |
Token based key management scheme for scada communication A Saxena, O Pal, S Saiwan, Z Saquib Int. J. Distrib. Parallel Syst 2, 69-86, 2011 | 6 | 2011 |
Key management for blockchain technology. ICT Express 7 (1): 76–80 O Pal, B Alam, V Thakur, S Singh | 5 | 2021 |
V. akur, and S O Pal, B Alam Singh,“Key management for blockchain technology,” ICT Express 7 (1), 76-80, 2019 | 5 | 2019 |