Sunil Karforma
According to our database1,
Sunil Karforma
authored at least 24 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Telecardiology in "New Normal" COVID-19: Efficacy of Neuro-Metaheuristic Session Key (NMSK) and Encryption Through Bipartite New State-of-Art Sharing.
Wirel. Pers. Commun., October, 2024
A hybrid approach for water body identification from satellite images using NDWI mapping and histogram of gradients.
Innov. Syst. Softw. Eng., June, 2024
2023
Medical Image Encryption Method Using Cubic-Sin-Logistic-Tent Chaotic Pseudo-Random Number Sequence-Based Substitution.
SN Comput. Sci., July, 2023
Establishment of Neural Series Transmission Keys (NSTKs) and Security in the Field of COVID-19 Telepediatric Oral Health.
Wirel. Pers. Commun., April, 2023
An Efficient Image Encryption Method Using Henon-Logistic-Tent Chaotic Pseudo Random Number Sequence.
Wirel. Pers. Commun., April, 2023
Isomorphic encryption and coupled ANN with Mealy machine: a cutting edge data security model for cloud computing environment.
Knowl. Inf. Syst., January, 2023
An optimal and efficient data security technique through crypto-stegano for E-commerce.
Multim. Tools Appl., 2023
Metaheuristic secured transmission in Telecare Medical Information System (TMIS) in the face of post-COVID-19.
J. Ambient Intell. Humaniz. Comput., 2023
2022
Cryptographic Engineering on COVID-19 Telemedicine: An Intelligent Transmission Through Recurrent Relation Based Session Key.
Wirel. Pers. Commun., 2022
An Approach of Secret Sharing Technique Based on Convolution Neural Network and DNA Sequence for Data Security in Wireless Communication.
Wirel. Pers. Commun., 2022
Neural perceptron & strict lossless secret sharing oriented cryptographic science: fostering patients' security in the "new normal" COVID-19 E-Health.
Multim. Tools Appl., 2022
A novel image encryption method for e-governance application using elliptic curve pseudo random number and chaotic random number sequence.
Multim. Tools Appl., 2022
Linear feedback shift register and integer theory: a state-of-art approach in security issues over e-commerce.
Electron. Commer. Res., 2022
2021
Musically Modified Substitution-Box for Clinical Signals Ciphering in Wireless Telecare Medical Communicating Systems.
Wirel. Pers. Commun., 2021
SN Comput. Sci., 2021
Episode of COVID-19 Telepsychiatry Session Key Origination Upon Swarm-Based Metaheuristic and Neural Perceptron Blend.
SN Comput. Sci., 2021
2019
A Block-based Adaptive Data Hiding Approach using Pixel value difference and LSB Substitution to Secure E-Governance Documents.
J. Inf. Process. Syst., 2019
Securing Packet Transmission Through Trusted Shortest Network Path Using Fuzzy Forecasting for Mobility of MANET Nodes.
Proceedings of the Security, Privacy and Trust in the IoT Environment, 2019
2015
CoRR, 2015
2012
Towards Design and Implementation of Space Efficient and Secured Transmission scheme on EGovernance data
CoRR, 2012
Object Oriented Modelling of Idea using GA based efficient key generation for e-governance security (OOMIG)
CoRR, 2012
2008
Ubiquity, 2008