Vandana Guleria

According to our database1, Vandana Guleria authored at least 24 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Highly efficient optimal decomposition approach and its mathematical analysis for solving fourth-order Lane-Emden-Fowler equations.
J. Comput. Appl. Math., 2025

2024
A novel multiple image encryption technique based on asymmetric cryptosystem with HCM in frequency domain.
Multim. Tools Appl., September, 2024

Multiple colour image encryption using multiple parameter FrDCT, 3D Arnold transform and RSA.
Multim. Tools Appl., May, 2024

Mixed-multiple image encryption algorithm using RSA cryptosystem with fractional discrete cosine transform and 2D-Arnold Transform.
Multim. Tools Appl., April, 2024

Multi-layer permutation-substitution operations based novel lossless multiple color image encryption.
Multim. Tools Appl., February, 2024

2023
A novel multi-layer color image encryption based on RSA cryptosystem, RP2DFrHT and generalized 2D Arnold map.
Multim. Tools Appl., October, 2023

Multi-layer security based multiple image encryption technique.
Comput. Electr. Eng., March, 2023

2021
Multi-layer color image encryption using random matrix affine cipher, RP2DFrHT and 2D Arnold map.
Multim. Tools Appl., 2021

Security of multiple RGB images in the time domain and frequency domain.
J. Inf. Secur. Appl., 2021

2020
A new multi-layer RGB image encryption algorithm based on Diffie-Hellman cryptography associated with FrDCT and arnold transform.
Multim. Tools Appl., 2020

Haar wavelet quasilinearization method for numerical solution of Emden-Fowler type equations.
Math. Comput. Simul., 2020

Security of multiple RGB images by RSA cryptosystem combined with FrDCT and Arnold transform.
J. Inf. Secur. Appl., 2020

2019
Haar wavelet collocation method for Lane-Emden equations with Dirichlet, Neumann and Neumann-Robin boundary conditions.
J. Comput. Appl. Math., 2019

An Authentication Framework for Roaming Service in Global Mobility Networks.
Inf. Technol. Control., 2019

2017
UC Secure Issuer-Free Adaptive Oblivious Transfer with Hidden Access Policy.
CoRR, 2017

2016
Efficient oblivious transfer with adaptive queries in UC framework.
Secur. Commun. Networks, 2016

2015
Universally composable issuer-free adaptive oblivious transfer with access policy.
Secur. Commun. Networks, 2015

2014
Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction.
Proceedings of the SECRYPT 2014, 2014

Lightweight Universally Composable Adaptive Oblivious Transfer.
Proceedings of the Network and System Security - 8th International Conference, 2014

Efficient Adaptive Oblivious Transfer in UC Framework.
Proceedings of the Information Security Practice and Experience, 2014

Issuer-Free Adaptive Oblivious Transfer with Access Policy.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Efficient Adaptive Oblivious Transfer Without q-type Assumptions in UC Framework.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Adaptive Oblivious Transfer Realizing Expressive Hidden Access Policy.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014


  Loading...