Umashankar Rawat
Umashankar Rawat
Manipal University Jaipur
Verified email at
Cited by
Cited by
Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map
M Kaur, D Singh, K Sun, U Rawat
Future Generation Computer Systems 107, 333-350, 2020
Image forgery detection using singular value decomposition with some attacks
NK Rathore, NK Jain, PK Shukla, US Rawat, R Dubey
National Academy Science Letters 44 (4), 331-338, 2021
A lightweight cellular automata based encryption technique for IoT applications
S Roy, U Rawat, J Karjee
IEEE Access 7, 39782-39793, 2019
IEHC: An efficient image encryption technique using hybrid chaotic map
K Kumar, S Roy, U Rawat, S Malhotra
Chaos, Solitons & Fractals 158, 111994, 2022
Lightweight solutions to counter DDoS attacks in software defined networking
M Conti, C Lal, R Mohammadi, U Rawat
Wireless Networks 25, 2751-2768, 2019
IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata
S Roy, M Shrivastava, CV Pandey, SK Nayak, U Rawat
Multimedia Tools and Applications 80, 31529-31567, 2021
Symmetric key encryption technique: a cellular automata based approach in wireless sensor networks
S Roy, J Karjee, US Rawat, N Dey
Procedia Computer Science 78, 408-414, 2016
IECA: an efficient IoT friendly image encryption technique using programmable cellular automata
S Roy, U Rawat, HA Sareen, SK Nayak
Journal of Ambient Intelligence and Humanized Computing 11, 5083-5102, 2020
IESCA: An efficient image encryption scheme using 2-D cellular automata
S Roy, M Shrivastava, U Rawat, CV Pandey, SK Nayak
Journal of Information Security and Applications 61, 102919, 2021
[Retracted] A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis
S Acharya, U Rawat, R Bhatnagar
Security and Communication Networks 2022 (1), 7775917, 2022
Distributed biomedical scheme for controlled recovery of medical encrypted images
D Pandey, U Rawat, NK Rathore, K Pandey, PK Shukla
IRBM 43 (3), 151-160, 2022
Efficient hybrid load balancing algorithm
NK Rathore, U Rawat, SC Kulhari
National Academy Science Letters 43, 177-185, 2020
Symmetric key encryption technique: A cellular automata based approach
D Parashar, S Roy, N Dey, V Jain, US Rawat
Cyber Security: Proceedings of CSI 2015, 59-67, 2018
Robust progressive block based visual cryptography with chaotic map
D Pandey, US Rawat, A Kumar
Journal of Discrete Mathematical Sciences and Cryptography 19 (5-6), 1025-1040, 2016
A low computational cost method for mobile malware detection using transfer learning and familial classification using topic modelling
S Acharya, U Rawat, R Bhatnagar
Applied Computational Intelligence and Soft Computing 2022 (1), 4119500, 2022
Secure vertical handover to NEMO using hybrid cryptosystem
VR Reddicherla, U Rawat, YJN Kumar, A Zaguia
Security and Communication Networks 2021 (1), 6751423, 2021
Secure Vertical Handover to NEMO using Hybrid Cryptosystem
A Zaguia, V Raju, YJN Kumar, U Rawat
Hindawi, Article ID 6751423, 0
A novel cryptosystem using cellular automata
S Roy, N Bhatia, US Rawat
2017 International Conference on Communication and Signal Processing (ICCSP …, 2017
Chaotic Map for Securing Digital Content: A Progressive Visual Cryptography Approach
D Pandey, U Rawat
International Journal of Rough Sets and Data Analysis 3 (1), 21-36, 2016
ECFS: An enterprise-class cryptographic file system for linux
US Rawat, S Kumar
International Journal of Information Security and Privacy (IJISP) 6 (2), 53-63, 2012
The system can't perform the operation now. Try again later.
Articles 1–20