Hari Om Ph.D. JNU
Indian School of Mines
H-index: 28
Asia-India
Top articles of Hari Om Ph.D. JNU
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Chaotic map based multi-factor authentication protocol for underwater environment monitoring | Multimedia Tools and Applications | Diksha Rangwani Hari Om | 2023/9/5 |
NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme | Computer Communications | Pankaj Kumar Hari Om | 2024/1/1 |
4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things | Peer-to-Peer Networking and Applications | Diksha Rangwani Hari Om | 2023/1 |
Reversible data hiding in encrypted image using two-pass pixel value ordering | Journal of Information Security and Applications | Arun Kumar Rai Hari Om Satish Chand Saurabh Agarwal | 2023/8/1 |
High-Capacity Reversible Data Hiding Based on Two-Layer Embedding Scheme for Encrypted Image Using Blockchain | Computers | Arun Kumar Rai Hari Om Satish Chand Chia-Chen Lin | 2023/6/12 |
An anonymous and authenticated V2I communication with a simplified user revocation and re-registration strategy | The Journal of Supercomputing | Pankaj Kumar Hari Om | 2023/5 |
High capacity reversible data hiding in encrypted images using prediction error encoding | Journal of Imaging | Eichi Arai Shoko Imaizumi | 2022/6/21 |
A robust four-factor authentication protocol for resource mining | Arabian Journal for Science and Engineering | Diksha Rangwani Hari Om | 2023/2 |
Four-factor mutual authentication scheme for health-care based on wireless body area network | The Journal of Supercomputing | Diksha Rangwani Hari Om | 2022/3 |
A learning framework of modified deep recurrent neural network for classification and recognition of voice mood | International Journal of Adaptive Control and Signal Processing | Gaurav Agarwal Hari Om Sachi Gupta | 2022/8 |
A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network | The Journal of Supercomputing | Pankaj Kumar Hari Om | 2022/11 |
Integrated management of brown spot disease of rice | Annals of Plant Protection Sciences | Sanjeeve Kumar Hari Om Anand Kumar | 2022 |
A secure and efficient authentication protocol for wireless applications in multi-server environment | Constantinos Kolias Vasilis Kolias Georgios Kambourakis | 2009/9/7 | |
Examining the Fungus in Dried Bombay-Duck (Harpadon nehereus) | National Academy Science Letters | Siddhnath Pooja Saklani Hari Om | 2022/6 |
High-fidelity reversible data hiding technique based on adaptive pairing of prediction errors | Multimedia Tools and Applications | Arun Kumar Rai Hari Om Satish Chand | 2022/6 |
A Privacy-Preserving Comparison Protocol | IEEE Transactions on Computers | Kartick Sutradhar Hari Om | 2022/10/25 |
Parallel training models of deep belief network using MapReduce for the classifications of emotions | International Journal of System Assurance Engineering and Management | Gaurav Agarwal Hari Om | 2022/6 |
Secure and efficient cache-based authentication scheme for vehicular ad-hoc networks | Wireless Networks | Pankaj Kumar Hari Om | 2022/10 |
Intra-block correlation based reversible data hiding in encrypted images using parametric binary tree labeling | AK Rai N Kumar R Kumar H Om S Chand | 2021 | |
An efficient simulation of quantum secret sharing | arXiv preprint arXiv:2103.11206 | Kartick Sutradhar Hari Om | 2021/3/20 |