Hari Om
According to our database1,
Hari Om
authored at least 88 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Chaotic map based multi-factor authentication protocol for underwater environment monitoring.
Multim. Tools Appl., March, 2024
NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme.
Comput. Commun., January, 2024
Multi-TA model-based conditional privacy-preserving authentication protocol for fog-enabled VANET.
Veh. Commun., 2024
2023
J. Inf. Secur. Appl., August, 2023
High-Capacity Reversible Data Hiding Based on Two-Layer Embedding Scheme for Encrypted Image Using Blockchain.
Comput., June, 2023
An anonymous and authenticated V2I communication with a simplified user revocation and re-registration strategy.
J. Supercomput., May, 2023
HindiSpeech-Net: a deep learning based robust automatic speech recognition system for Hindi language.
Multim. Tools Appl., May, 2023
High capacity reversible data hiding in encrypted images using prediction error encoding.
Multim. Tools Appl., March, 2023
4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things.
Peer Peer Netw. Appl., January, 2023
2022
Secure and efficient cache-based authentication scheme for vehicular ad-hoc networks.
Wirel. Networks, 2022
Four-factor mutual authentication scheme for health-care based on wireless body area network.
J. Supercomput., 2022
A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network.
J. Supercomput., 2022
A secure and efficient authentication protocol for wireless applications in multi-server environment.
Peer-to-Peer Netw. Appl., 2022
High-fidelity reversible data hiding technique based on adaptive pairing of prediction errors.
Multim. Tools Appl., 2022
2021
Intra-Block Correlation Based Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling.
Symmetry, 2021
Quantum Inf. Process., 2021
An enhanced and provably secure authentication protocol using Chebyshev chaotic maps for multi-server environment.
Multim. Tools Appl., 2021
An efficient supervised framework for music mood recognition using autoencoder-based optimised support vector regression model.
IET Signal Process., 2021
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2021
2020
IEEE Trans. Circuits Syst., 2020
Quantum Inf. Process., 2020
Design of a USIM and ECC based handover authentication scheme for 5G-WLAN heterogeneous networks.
Digit. Commun. Networks, 2020
2019
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2019
Multim. Tools Appl., 2019
MCRMR: Maximum coverage and relevancy with minimal redundancy based multi-document summarization.
Expert Syst. Appl., 2019
A modified neuro-fuzzy classifier and its parallel implementation on modern GPUs for real time intrusion detection.
Appl. Soft Comput., 2019
2018
Distributed fuzzy approach to unequal clustering and routing algorithm for wireless sensor networks.
Int. J. Commun. Syst., 2018
Intrusion detection in RFID system using computational intelligence approach for underground mines.
Int. J. Commun. Syst., 2018
An extended ECC-based anonymity-preserving 3-factor remote authentication scheme usable in TMIS.
Int. J. Commun. Syst., 2018
An improved and secure multiserver authentication scheme based on biometrics and smartcard.
Digit. Commun. Networks, 2018
Adv. Data Anal. Classif., 2018
Proceedings of the 15th International Conference on Natural Language Processing, 2018
2017
Cryptanalysis and Improvement of an Anonymous Multi-server Authenticated Key Agreement Scheme.
Wirel. Pers. Commun., 2017
Multim. Tools Appl., 2017
Multim. Tools Appl., 2017
DUCR: Distributed unequal cluster-based routing algorithm for heterogeneous wireless sensor networks.
Int. J. Commun. Syst., 2017
Distributed fuzzy logic based energy-aware and coverage preserving unequal clustering algorithm for wireless sensor networks.
Int. J. Commun. Syst., 2017
Cryptanalysis and Security Enhancement of Three-Factor Remote User Authentication Scheme for Multi-Server Environment.
Int. J. Bus. Data Commun. Netw., 2017
Hybrid framework using data mining techniques for early detection and prevention of oral cancer.
Int. J. Adv. Intell. Paradigms, 2017
Cryptanalysis and improvement of a biometric-based remote user authentication protocol usable in a multiserver environment.
Trans. Emerg. Telecommun. Technol., 2017
A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC.
Comput. Commun., 2017
A Secure and Privacy Preserving Remote User Authentication Protocol for Internet of Things Environment.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017
2016
An Efficient Remote User Password Authentication Scheme based on Rabin's Cryptosystem.
Wirel. Pers. Commun., 2016
Int. J. Bus. Data Commun. Netw., 2016
Int. J. Bus. Data Commun. Netw., 2016
Int. J. Bus. Data Commun. Netw., 2016
Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines.
Comput. Networks, 2016
2015
Signal Image Video Process., 2015
Netw. Model. Anal. Health Informatics Bioinform., 2015
J. Intell. Inf. Syst., 2015
KSII Trans. Internet Inf. Syst., 2015
Modified GUIDE (LM) algorithm for mining maximal high utility patterns from data streams.
Int. J. Comput. Intell. Syst., 2015
Proceedings of the Eighth International Conference on Contemporary Computing, 2015
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2015
Proceedings of the 2015 International Conference on Information Technology, 2015
2014
Significant patterns for oral cancer detection: association rule on clinical examination and history data.
Netw. Model. Anal. Health Informatics Bioinform., 2014
Netw. Model. Anal. Health Informatics Bioinform., 2014
Proceedings of the Advances in Intelligent Informatics, 2014
Proceedings of the International Conference on Data Science & Engineering, 2014
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014
Proceedings of the 2014 International Conference on Information Technology, 2014
2013
Netw. Model. Anal. Health Informatics Bioinform., 2013
2012
A hybrid system for reducing the false alarm rate of anomaly intrusion detection system.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012
Proceedings of the Intelligent Informatics, 2012
2010
Commun. Netw., 2010
Comput. Networks, 2010
2009
Digit. Signal Process., 2009
2008
Efficient utilization of buffer storage in conservative staircase broadcasting scheme.
IEEE Trans. Consumer Electron., 2008
Multidimens. Syst. Signal Process., 2008
2007
IEEE Trans. Multim., 2007
IEEE Trans. Circuits Syst. Video Technol., 2007
2006
IEEE Trans. Consumer Electron., 2006
IEEE Trans. Consumer Electron., 2006
IEEE Trans. Consumer Electron., 2006
2005
Seamless channel transition using Bespoke broadcasting scheme for video-on-demand service.
IEEE Trans. Consumer Electron., 2005
IEEE Trans. Consumer Electron., 2005
2004
IEEE Trans. Consumer Electron., 2004
2003
IEEE Trans. Consumer Electron., 2003
IEEE Trans. Consumer Electron., 2003
IEEE Trans. Consumer Electron., 2003
2002
IEEE Trans. Broadcast., 2002