Browsing by Author Kakkar, Ajay

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 7 to 24 of 24 < previous 
Issue DateTitleAuthor(s)
3-Aug-2015Efficient Key Management for Data Security using AESKakkar, Ajay; Kansal, Nitish
28-Jul-2015Efficient Key Management for Data Security using TDESKakkar, Ajay; Puri, Gaurav
8-Aug-2016Gray Code Image Encryption using Knight Tour ScramblerKakkar, Ajay; Singh, Manjinder
1-Aug-2016Image Authentication and Security using Digital SignaturesKakkar, Ajay; Kaur, Harpreet
31-Aug-2018Improving AES-128 Using Multiple Cipher Keys and Key Dependent S-BoxesKakkar, Ajay; Sachdeva, Shivani
18-Aug-2018LSB based Steganography Techniques for Data Transmission SecurityKakkar, Ajay; Kaushal, Sahil
20-Aug-2014Optimization of Encryption Algorithm for Secured CommunicationKakkar, Ajay; Kumar, Ajay
20-Aug-2014Optimization of Encryption Algorithm for Secured CommunicationKakkar, Ajay; Kumar, Ajay
26-Mar-2019Optimization of Environmentally Powered Wireless Sensor Networks for Efficient Energy HarvestingKakkar, Ajay; Sharma, Amandeep
14-Aug-2014Optimized Encryption Algorithm using Dynamic KeysKakkar, Ajay; Mittal, Hitesh
4-Aug-2014Optimized Key Management System in Cryptographic algorithms for Data SecurityKakkar, Ajay; Kumar, Rakesh
18-Apr-2007Reliable Encryption Algorithm Used For CommunicationBansal, P. K.; Randhawa, H. K. S.; Kakkar, Ajay
16-Sep-2013Resource Optimization by SchedulingKakkar, Ajay; Udvanshi, Pankaj
29-Aug-2017Sharing of a Digital Secret Image by Diverse Media for more SecurityKakkar, Ajay; Kaur, Tejbir
28-Aug-2012Static Scheduling in Real Time for Resource OptimizationKakkar, Ajay; Khera, Ishan
27-Oct-2010To Observe Stability in the Operation of the DC Motor by Incorporating Uncertainity through Fuzzy LogicKaur, Gagandeep; Kakkar, Ajay; Singh, Harsimranjit
13-Sep-2024Verification and Environment Automation for Debug Optimization of Intellectual Property for Safety IPKakkar, Ajay; Jain, Priyam
16-Sep-2016Wireless Sensor Network Security Using Certificateless CryptographyKakkar, Ajay; Gill, Mishika