Arun Mishra

Orcid: 0000-0002-3683-1020

According to our database1, Arun Mishra authored at least 20 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient implementation of post quantum MLWR-based PKE scheme using NTT.
Comput. Electr. Eng., 2024

2023
LWR-based Quantum-Safe Pseudo-Random Number Generator.
J. Inf. Secur. Appl., March, 2023

LWE based quantum-resistant pseudo-random number generator.
Int. Arab J. Inf. Technol., 2023

Non Deterministic Pseudorandom Generator for Quantum Key Distribution.
CoRR, 2023

Pseudo Random Binary Sequence using Lattice-based Hard Problem for Quantum Key Distribution.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2023

2020
Hardening web browser security configuration using machine learning technique.
Int. J. Electron. Bus., 2020

2018
Information Processing and Security Analysis of Shared System Resource Based Architectures.
Int. J. Cooperative Inf. Syst., 2018

2017
Relating Wiener's cybernetics aspects and a situation awareness model implementation for information security risk management.
Kybernetes, 2017

Relation between cybernetics and information security: from Norbert Wiener's perspectives.
Kybernetes, 2017

Quantitative analysis of information leakage in service-oriented architecture-based Web services.
Kybernetes, 2017

Framework to Secure Browser Using Configuration Analysis.
Int. J. Inf. Secur. Priv., 2017

2016
Authentication of Electronic Control Unit using Arbiter Physical Unclonable Functions in Modern Automobiles.
ICTCS, 2016

2015
Audit and Analysis of Impostors: An experimental approach to detect fake profile in online social network.
Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, 2015

2014
Authentication of Trusted Platform Module Using Processor Response.
Proceedings of the Security in Computing and Communications, 2014

An FPGA Based Ecosystem for USBPHY Validation.
Proceedings of the 15th International Microprocessor Test and Verification Workshop, 2014

2013
Monitoring Information Leakage in a Web Browser.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

Securing the Root Through SELinux.
Proceedings of the Intelligent Computing, 2013

2010
Dynamic adaptability with .NET service components.
J. Object Technol., 2010

Context-Aware System Using .NET Approach.
Proceedings of the Information Processing and Management, 2010

2009
Component assessment and proactive model for support of dynamic integration in self adaptive system.
ACM SIGSOFT Softw. Eng. Notes, 2009


  Loading...