Hari Om

According to our database1, Hari Om authored at least 88 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Chaotic map based multi-factor authentication protocol for underwater environment monitoring.
Multim. Tools Appl., March, 2024

NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme.
Comput. Commun., January, 2024

Multi-TA model-based conditional privacy-preserving authentication protocol for fog-enabled VANET.
Veh. Commun., 2024

2023
Reversible data hiding in encrypted image using two-pass pixel value ordering.
J. Inf. Secur. Appl., August, 2023

A Privacy-Preserving Comparison Protocol.
IEEE Trans. Computers, June, 2023

High-Capacity Reversible Data Hiding Based on Two-Layer Embedding Scheme for Encrypted Image Using Blockchain.
Comput., June, 2023

An anonymous and authenticated V2I communication with a simplified user revocation and re-registration strategy.
J. Supercomput., May, 2023

HindiSpeech-Net: a deep learning based robust automatic speech recognition system for Hindi language.
Multim. Tools Appl., May, 2023

High capacity reversible data hiding in encrypted images using prediction error encoding.
Multim. Tools Appl., March, 2023

4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things.
Peer Peer Netw. Appl., January, 2023

2022
Secure and efficient cache-based authentication scheme for vehicular ad-hoc networks.
Wirel. Networks, 2022

Four-factor mutual authentication scheme for health-care based on wireless body area network.
J. Supercomput., 2022

A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network.
J. Supercomput., 2022

A secure and efficient authentication protocol for wireless applications in multi-server environment.
Peer-to-Peer Netw. Appl., 2022

High-fidelity reversible data hiding technique based on adaptive pairing of prediction errors.
Multim. Tools Appl., 2022

2021
Intra-Block Correlation Based Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling.
Symmetry, 2021

A cost-effective quantum protocol for secure multi-party multiplication.
Quantum Inf. Process., 2021

An enhanced and provably secure authentication protocol using Chebyshev chaotic maps for multi-server environment.
Multim. Tools Appl., 2021

An efficient supervised framework for music mood recognition using autoencoder-based optimised support vector regression model.
IET Signal Process., 2021

An Efficient Simulation of Quantum Secret Sharing.
CoRR, 2021

ViStA: Video Streaming and Analytics Benchmark.
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2021

2020
A Generalized Quantum Protocol for Secure Multiparty Summation.
IEEE Trans. Circuits Syst., 2020

Efficient quantum secret sharing without a trusted player.
Quantum Inf. Process., 2020

Design of a USIM and ECC based handover authentication scheme for 5G-WLAN heterogeneous networks.
Digit. Commun. Networks, 2020

2019
A Comparative Analysis on Hindi and English Extractive Text Summarization.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2019

Detection of copy-move forgery using AKAZE and SIFT keypoint extraction.
Multim. Tools Appl., 2019

Authentication of medical images using passive approach.
IET Image Process., 2019

MCRMR: Maximum coverage and relevancy with minimal redundancy based multi-document summarization.
Expert Syst. Appl., 2019

A modified neuro-fuzzy classifier and its parallel implementation on modern GPUs for real time intrusion detection.
Appl. Soft Comput., 2019

2018
Distributed fuzzy approach to unequal clustering and routing algorithm for wireless sensor networks.
Int. J. Commun. Syst., 2018

Intrusion detection in RFID system using computational intelligence approach for underground mines.
Int. J. Commun. Syst., 2018

An extended ECC-based anonymity-preserving 3-factor remote authentication scheme usable in TMIS.
Int. J. Commun. Syst., 2018

An improved and secure multiserver authentication scheme based on biometrics and smartcard.
Digit. Commun. Networks, 2018

Equi-Clustream: a framework for clustering time evolving mixed data.
Adv. Data Anal. Classif., 2018

Fuzzy Evolutionary Self-Rule generation and Text Summarization.
Proceedings of the 15th International Conference on Natural Language Processing, 2018

2017
Cryptanalysis and Improvement of an Anonymous Multi-server Authenticated Key Agreement Scheme.
Wirel. Pers. Commun., 2017

Newborn face recognition using deep convolutional neural network.
Multim. Tools Appl., 2017

(Two-Dimensional)2 whitening reconstruction for newborn recognition.
Multim. Tools Appl., 2017

DUCR: Distributed unequal cluster-based routing algorithm for heterogeneous wireless sensor networks.
Int. J. Commun. Syst., 2017

Distributed fuzzy logic based energy-aware and coverage preserving unequal clustering algorithm for wireless sensor networks.
Int. J. Commun. Syst., 2017

Cryptanalysis and Security Enhancement of Three-Factor Remote User Authentication Scheme for Multi-Server Environment.
Int. J. Bus. Data Commun. Netw., 2017

Hybrid framework using data mining techniques for early detection and prevention of oral cancer.
Int. J. Adv. Intell. Paradigms, 2017

Cryptanalysis and improvement of a biometric-based remote user authentication protocol usable in a multiserver environment.
Trans. Emerg. Telecommun. Technol., 2017

A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC.
Comput. Commun., 2017

A Secure and Privacy Preserving Remote User Authentication Protocol for Internet of Things Environment.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017

2016
An Efficient Remote User Password Authentication Scheme based on Rabin's Cryptosystem.
Wirel. Pers. Commun., 2016

Lightweight, ECC based RFID Authentication Scheme for WLAN.
Int. J. Bus. Data Commun. Netw., 2016

Improved Traceable-Resistant Efficient Authentication Schemes for Wireless Networks.
Int. J. Bus. Data Commun. Netw., 2016

A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme.
Int. J. Bus. Data Commun. Netw., 2016

Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines.
Comput. Networks, 2016

2015
A generalized image denoising method using neighbouring wavelet coefficients.
Signal Image Video Process., 2015

GMDH polynomial and RBF neural network for oral cancer classification.
Netw. Model. Anal. Health Informatics Bioinform., 2015

Hybrid data labeling algorithm for clustering large mixed type data.
J. Intell. Inf. Syst., 2015

Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint.
KSII Trans. Internet Inf. Syst., 2015

Modified GUIDE (LM) algorithm for mining maximal high utility patterns from data streams.
Int. J. Comput. Intell. Syst., 2015

An efficient undeniable signature scheme using braid groups.
Proceedings of the Eighth International Conference on Contemporary Computing, 2015

Host-Based Intrusion Detection Using Statistical Approaches.
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2015

A Secure Seamless Handover Authentication Technique for Wireless LAN.
Proceedings of the 2015 International Conference on Information Technology, 2015

2014
Significant patterns for oral cancer detection: association rule on clinical examination and history data.
Netw. Model. Anal. Health Informatics Bioinform., 2014

Using MLP and SVM for predicting survival rate of oral cancer patients.
Netw. Model. Anal. Health Informatics Bioinform., 2014

Time-Efficient Tree-Based Algorithm for Mining High Utility Patterns.
Proceedings of the Advances in Intelligent Informatics, 2014

A modified remote authentication method with smartcards and check digits.
Proceedings of the International Conference on Data Science & Engineering, 2014

Remote Login Password Authentication Scheme Using Tangent Theorem on Circle.
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014

Remote Login Password Authentication Scheme Based on Cuboid Using Biometric.
Proceedings of the 2014 International Conference on Information Technology, 2014

2013
Data mining models for predicting oral cancer survivability.
Netw. Model. Anal. Health Informatics Bioinform., 2013

2012
A hybrid system for reducing the false alarm rate of anomaly intrusion detection system.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

Selective Parameters Based Image Denoising Method.
Proceedings of the Intelligent Informatics, 2012

2010
Designing Intrusion Detection System for Web Documents Using Neural Network.
Commun. Netw., 2010

Efficient staircase scheme with seamless channel transition mechanism.
Comput. Networks, 2010

2009
Video Data Delivery using Slotted Patching.
J. Netw. Comput. Appl., 2009

Storage space estimation for videos using fading channels.
Digit. Signal Process., 2009

Segmented patching broadcasting protocol for video data.
Comput. Commun., 2009

2008
Efficient utilization of buffer storage in conservative staircase broadcasting scheme.
IEEE Trans. Consumer Electron., 2008

Phase estimation in data channelization for video transmitting.
Multidimens. Syst. Signal Process., 2008

Patching-based broadcasting scheme for video services.
Comput. Commun., 2008

2007
Geometrico-Harmonic Broadcasting Scheme With Continuous Redundancy.
IEEE Trans. Multim., 2007

Geometrico-Harmonic Data Broadcasting and Receiving Scheme for Popular Videos.
IEEE Trans. Circuits Syst. Video Technol., 2007

Modeling of Buffer Storage in Video Transmission.
IEEE Trans. Broadcast., 2007

2006
Seamless channel transition for cautious harmonic scheme in video data broadcasting.
IEEE Trans. Consumer Electron., 2006

Generalized conservative staircase data broadcasting protocol for video-on-demand.
IEEE Trans. Consumer Electron., 2006

Request based data delivery in video-on-demand services.
IEEE Trans. Consumer Electron., 2006

2005
Seamless channel transition using Bespoke broadcasting scheme for video-on-demand service.
IEEE Trans. Consumer Electron., 2005

Modified polyharmonic data broadcasting scheme for popular videos.
IEEE Trans. Consumer Electron., 2005

2004
Partially prestored harmonic data broadcasting scheme for popular videos.
IEEE Trans. Consumer Electron., 2004

2003
Modified bespoke data broadcasting scheme for popular videos.
IEEE Trans. Consumer Electron., 2003

Buffer evaluation in variable bandwidth channelization for videos.
IEEE Trans. Consumer Electron., 2003

Bespoke data broadcasting scheme for popular videos.
IEEE Trans. Consumer Electron., 2003

2002
Modified staircase data broadcasting scheme for popular videos.
IEEE Trans. Broadcast., 2002


  Loading...