2017
Towards Parameterized Shared Key for AVK Approach
Source: IGI Global
Author(s): Prajapat, Shaligram; Thakur, Ramjeevan Singh
Pages: 61-78
DOI: 10.4018/978-1-5225-0536-5.ch004
URL : http://www.igi-global.com/chapter/towards-parameterized-shared-key-for-avk-approach
AVK based Cryptosystem Recent Directions Towards Cryptanalysis
Author(s): Shaligram Prajapat, Ashok Sharma, Ramjeevan Singh Thakur
Source: Journal of Internet Computing and Services Volume: 17 Issue: 5 Pages: 97-110 Published: 2016
Cryptic Mining for Automatic Variable Key Based Cryptosystem
Author(s): Prajapat, Shaligram; Thakur, Ramjeevan Singh
Source: Procedia Computer Science Volume: 78 Pages: 199-209 Published: 2016
URL : http://dx.doi.org/10.1016/j.procs.2016.02.034
DOI: 10.1016/j.procs.2016.02.034
[Scopus]
Cryptic-mining: Association rules extractions using session log
Author(s): Prajapat, S.; Thakur, R.S.
Conference: IEEE International Conference on Computer Communication and Control, IC4 2015 Year: 2016
DOI: 10.1109/IC4.2015.7375687
URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-84962789064&partnerID=MN8TOAR ...
Graph mining approach towards recommendation system using feedback
Author(s): Dhawale, C.A.; Prajapat, S.; Hegadi, R.; et al.
Conference: 2015 IEEE International WIE Conference on Electrical and Computer Engineering, WIECON-ECE 2015 Pages: 365-369 Year: 2016
DOI: 10.1109/WIECON-ECE.2015.7443994
URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-84971646073&partnerID=MN8TOAR ...
Key Diffusion Approach for AVK Based Cryptosystem
Author(s): Prajapat, Shaligram; Thakur, Ramjeevan Singh
Conference: Ictcs '16 Pages: 78:1--78:9 Year: 2016
DOI: 10.1145/2905055.2905288
URL : http://dl.acm.org/citation.cfm?id=2905288&dl=ACM&coll=DL&CFID=841223176&CFTOKEN= ...
Optimal Key Size of the AVK for Symmetric Key Encryption
Author(s): Prajapat, Shaligram; Thakur, Ramjeevan Singh
Source: Covenant Journal of Informatics and Communication Technology Volume: 3 Issue: 2 Published: 2016
Realization of information exchange with Fibo-Q based Symmetric Cryptosystem
Source: International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 2, February 2016 Published: 2016
URL : https://www.academia.edu/22873440/Realization_of_information_exchange_with_Fibo- ...
Challenges Associated With Automation of NPO
Conference: Atlantis Press and Springer International Year: 2015
DOI: 10.2991/978-94-6239-102-4_135
URL : http://link.springer.com/chapter/10.2991%2F978-94-6239-102-4_135
Challenges Associated With Automation of NPO: Requirement Engineering Phase
Author(s): Mathai, Misha P.; Raikwar, Sunny; Sagore, Rahul; et al.
Source: Proceedings of the 21st International Conference on Industrial Engineering and Engineering Management 2014 Pages: 665-669 Published: 2015
DOI: 10.2991/978-94-6239-102-4_135
URL : http://dx.doi.org/10.2991/978-94-6239-102-4_135
Cryptic mining in the light of AI
Shaligram Prajapat, Aditi Thakur, Kajol Maheshwari, Ramjeevan Singh Thakur
Source: (IJACSA) International Journal of Advanced Computer Science and Applications Published: 2015
DOI: 10.14569/IJACSA.2015.060808
URL : http://thesai.org/Downloads/Volume6No8/Paper_8-Cryptic_Mining_in_Light_of_Artifigence
Cryptic-Mining Association Rules Extractions Using Session Log
Source: Computational Science and Its Applications -- ICCSA 2015 Published: 2015
DOI: 10.1007/978-3-319-21410-8_53
URL : http://link.springer.com/chapter/10.1007/978-3-319-21410-8_53#
Cryptic-mining: Association rules extractions using session log
Author(s): Prajapat, Shaligram; Thakur, Ramjeevan Singh
Conference: 2015 International Conference on Computer, Communication and Control (IC4) Year: 2015/09
DOI: 10.1109/ic4.2015.7375687
URL : http://dx.doi.org/10.1109/ic4.2015.7375687
Cryptic-mining: Association rules extractions using session log
Author(s): Prajapat, Shaligram; Thakur, Ramjeevan Singh
Conference: 2015 International Conference on Computer, Communication and Control (IC4) Year: 2015/09
DOI: 10.1109/ic4.2015.7375687
URL : http://dx.doi.org/10.1109/ic4.2015.7375687
Cryptic-Mining: Association Rules Extractions Using Session Log
Author(s): Prajapat, Shaligram; Thakur, Ramjeevan Singh
Source: Computational Science and Its Applications -- ICCSA 2015 Pages: 699-711 Published: 2015
DOI: 10.1007/978-3-319-21410-8_53
URL : http://dx.doi.org/10.1007/978-3-319-21410-8_53
Cryptic-mining: Association rules extractions using session log
Author(s): Prajapat, S.; Thakur, R.S.
Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Volume: 9158 Pages: 699-711 Published: 2015
DOI: 10.1007/978-3-319-21410-8_53
URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-84949033500&partnerID=MN8TOAR ...
DC-model for quality improvement in technical education
Author(s): Kulkarni, A.; Khan, A.; Mishra, N.; et al.
Conference: Proceedings of the 2014 IEEE International Conference on MOOCs, Innovation and Technology in Education, IEEE MITE 2014 Pages: 308-312 Year: 2015
DOI: 10.1109/MITE.2014.7020293
URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-84923485096&partnerID=MN8TOAR ...
Investigation for efficient Cryptosystem using SGcrypter
Author(s): Shaligram Prajapat, Gaurav Parmar R. S. Thakur
Source: IJAER Journal Volume: 70 Issue: Volume 10, Number 79 (2015) Special Pages: 853-858 Published: 2015
URL : http://www.ripublication.com/ijaerspl3/ijaerv10n79spl_172.pdf
Author(s): Prajapat, Shaligram; Singh, Ramjeevan
Source: International Journal of Computer Applications Volume: 127 Issue: 14 Pages: 15-24 Published: 2015/10/15
DOI: 10.5120/ijca2015906518
URL : http://dx.doi.org/10.5120/ijca2015906518
Various Approaches towards Cryptanalysis
Source: International Journal of Computer Applications Published: 2015
DOI: 10.5120/ijca2015906518
URL : http://www.ijcaonline.org/archives/volume127/number14/22797-2015906518
DC-model for quality improvement in technical education
Author(s): Kulkarni, Ankit; Khan, Ajeet; Mishra, Nitesh; et al.
Conference: 2014 IEEE International Conference on MOOC, Innovation and Technology in Education (MITE) Year: 2014/12
DOI: 10.1109/mite.2014.7020293
URL : http://dx.doi.org/10.1109/mite.2014.7020293
DC-model for quality improvement in technical education
Author(s): Kulkarni, Ankit; Khan, Ajeet; Mishra, Nitesh; et al.
Conference: 2014 IEEE International Conference on MOOC, Innovation and Technology in Education (MITE) Year: 2014/12
DOI: 10.1109/mite.2014.7020293
URL : http://dx.doi.org/10.1109/mite.2014.7020293
2014
Investigation of SPM Approaches for Academic IT - Projects
Author(s): Karandikar, Varsha; Mehra, Ankit; Prajapat, Shaligram
DOI: 10.1007/978-3-319-09156-3_20
URL : http://dx.doi.org/10.1007/978-3-319-09156-3_20
2014
Investigation of SPM approaches for academic IT-projects
Author(s): Karandikar, V.; Mehra, A.; Prajapat, S.
Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Volume: 8583 LNCS Issue: PART 5 Pages: 265-282 Published: 2014
DOI: 10.1007/978-3-319-09156-3_20
URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-84904895637&partnerID=MN8TOAR ...
2014
Sparse approach for realizing AVK for Symmetric Key Encryption
Author(s): Sharma, Ashok; Prajapat, Shaligram; Swami, Shashank; et al.
Source: Ijrdet Volume: 2 Issue: 4 Pages: 15--18 Published: 2014
URL : https://scholar.googleusercontent.com/citations?view_op=export_citations&user=GU ...
2014
Time variant approach towards symmetric key
Author(s): Prajapat, S.; Rajput, D.; Thakur, R.S.
Conference: Proceedings of 2013 Science and Information Conference, SAI 2013 Pages: 398-405 Year: 2013
URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-84892533150&partnerID=MN8TOAR ...
2016
Apriori Analysis of Parameterized Automatic Variable Key based Symmetric Cryptosystem
URL : https://www.academia.edu/22873721/Cryptic_Mining_Apriori_Analysis_of_Parameteriz ...
2014
Investigation of SPM Approaches for Academic IT–Projects
Author(s): Karandikar, Varsha; Mehra, Ankit; Prajapat, Shaligram
2014
Recent AVK Approaches Towards Cryptanalysis
Author(s): Prajapat, Shaligram; Sharma, Ashok; Thakur, R. S.
2015
Recent AVK Approaches Towards Cryptanalysis
URL : http://www.iconi.org/2015/iconi/ICONI_2015_program_Symposium_KSII_1208_v8.pdf
2014
Sparse approach for realizing AVK for Symmetric Key Encryption
Author(s): Prajapat, Shaligram; Sharma, A.; Swami, S.; et al.
2012
A novel approach for information security with automatic variable key using Fibonacci Q-matrix
Author(s): Prajapat, Shaligram; Jain, Amber; Thakur, Ramjeevan Singh
Source: IJCCT Volume: 3 Issue: 3 Pages: 54-57 Published: 2012