Sunil Karforma

According to our database1, Sunil Karforma authored at least 24 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Telecardiology in "New Normal" COVID-19: Efficacy of Neuro-Metaheuristic Session Key (NMSK) and Encryption Through Bipartite New State-of-Art Sharing.
Wirel. Pers. Commun., October, 2024

A hybrid approach for water body identification from satellite images using NDWI mapping and histogram of gradients.
Innov. Syst. Softw. Eng., June, 2024

2023
Medical Image Encryption Method Using Cubic-Sin-Logistic-Tent Chaotic Pseudo-Random Number Sequence-Based Substitution.
SN Comput. Sci., July, 2023

Establishment of Neural Series Transmission Keys (NSTKs) and Security in the Field of COVID-19 Telepediatric Oral Health.
Wirel. Pers. Commun., April, 2023

An Efficient Image Encryption Method Using Henon-Logistic-Tent Chaotic Pseudo Random Number Sequence.
Wirel. Pers. Commun., April, 2023

Isomorphic encryption and coupled ANN with Mealy machine: a cutting edge data security model for cloud computing environment.
Knowl. Inf. Syst., January, 2023

An optimal and efficient data security technique through crypto-stegano for E-commerce.
Multim. Tools Appl., 2023

Metaheuristic secured transmission in Telecare Medical Information System (TMIS) in the face of post-COVID-19.
J. Ambient Intell. Humaniz. Comput., 2023

2022
Cryptographic Engineering on COVID-19 Telemedicine: An Intelligent Transmission Through Recurrent Relation Based Session Key.
Wirel. Pers. Commun., 2022

An Approach of Secret Sharing Technique Based on Convolution Neural Network and DNA Sequence for Data Security in Wireless Communication.
Wirel. Pers. Commun., 2022

Neural perceptron & strict lossless secret sharing oriented cryptographic science: fostering patients' security in the "new normal" COVID-19 E-Health.
Multim. Tools Appl., 2022

A novel image encryption method for e-governance application using elliptic curve pseudo random number and chaotic random number sequence.
Multim. Tools Appl., 2022

Linear feedback shift register and integer theory: a state-of-art approach in security issues over e-commerce.
Electron. Commer. Res., 2022

2021
Musically Modified Substitution-Box for Clinical Signals Ciphering in Wireless Telecare Medical Communicating Systems.
Wirel. Pers. Commun., 2021

ICT-Guided Glycemic Information Sharing Through Artificial Neural Telecare Network.
SN Comput. Sci., 2021

Episode of COVID-19 Telepsychiatry Session Key Origination Upon Swarm-Based Metaheuristic and Neural Perceptron Blend.
SN Comput. Sci., 2021

2019
A Block-based Adaptive Data Hiding Approach using Pixel value difference and LSB Substitution to Secure E-Governance Documents.
J. Inf. Process. Syst., 2019

Securing Packet Transmission Through Trusted Shortest Network Path Using Fuzzy Forecasting for Mobility of MANET Nodes.
Proceedings of the Security, Privacy and Trust in the IoT Environment, 2019

2015
A Space-Efficient Approach towards Distantly Homologous Protein Similarity Searches.
CoRR, 2015

DSA Security Enhancement through Efficient Nonce Generation.
CoRR, 2015

2012
Towards Design and Implementation of Space Efficient and Secured Transmission scheme on EGovernance data
CoRR, 2012

Risks and remedies in e-learning system
CoRR, 2012

Object Oriented Modelling of Idea using GA based efficient key generation for e-governance security (OOMIG)
CoRR, 2012

2008
A prototype design for DRM based credit card transaction in E-commerce.
Ubiquity, 2008


  Loading...