Follow
Dr. Anuj Kumar Singh
Dr. Anuj Kumar Singh
Amity University Madhya Pradesh, Gwalior, India
Verified email at gwa.amity.edu - Homepage
Title
Cited by
Cited by
Year
Elliptic curve signcryption-based mutual authentication protocol for smart cards
AK Singh, A Solanki, A Nayyar, B Qureshi
Applied Sciences 10 (22), 8291, 2020
162020
Security of low computing power devices: A survey of requirements, challenges & possible solutions
AK Singh, BDK Patro
Cybernetics and Information Technologies 19 (1), 133-164, 2019
162019
A review of elliptic curve based signcryption schemes
AK Singh
International Journal of Computer Applications 102 (6), 2014
162014
An efficient signcryption scheme based on ECC with forward secrecy and encrypted message authentication
M Dutta, AK Singh, A Kumar
2013 3rd IEEE International Advance Computing Conference (IACC), 399-403, 2013
152013
Elliptic curve signcryption based security protocol for RFID
AK Singh, BDK Patro
KSII Transactions on Internet and Information Systems (TIIS) 14 (1), 344-365, 2020
122020
Survey of onion routing approaches: advantages, limitations and future scopes
M Chauhan, AK Singh, Komal
Proceeding of the International Conference on Computer Networks, Big Data …, 2020
102020
Security Attacks on RFID and their Countermeasures
AK Singh, BDK Patro
Computer Communication, Networking and IoT: Proceedings of ICICC 2020, 509-518, 2021
92021
Performance comparison of signcryption schemes–a step towards designing lightweight cryptographic mechanism
AK Singh, BDK Patro
International Journal of Engineering and Technology (IJET) 9 (2), 1163-1170, 2017
92017
A lightweight signcryption scheme based on elliptic curve cryptography
AK Singh, KS Vaisla
Proc. 1st Int. Conf. Adv. Comput. Commun. Eng.(ICACCE) 1, 7-10, 2014
82014
A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud
AK Singh, A Nayyar, A Garg
Multimedia Tools and Applications 82 (15), 22525-22576, 2023
72023
Improved seam carving for structure preservation using efficient energy function
A Garg, A Nayyar, AK Singh
Multimedia Tools and Applications 81 (9), 12883-12924, 2022
62022
Applications of Internet of Things (IoT) in green computing
A Garg, AK Singh
Intelligence of Things: AI-IoT Based Critical-Applications and Innovations, 1-34, 2021
62021
Analysis of seam carving technique: limitations, improvements and possible solutions
A Garg, AK Singh
The Visual Computer 39 (7), 2683-2709, 2023
52023
A novel security protocol for wireless sensor networks based on elliptic curve Signcryption
AK Singh, DBDK Patro
International Journal of Computer Networks & Communications (IJCNC) Vol 11, 2019
52019
A modified scheme for preventing web application against sql injection attack
K Choudhary, AK Singh, R Gupta
International Journal of Computer Applications 141 (10), 0975-8887, 2016
52016
Signcryption-Based Security Framework for Low Computing Power Devices
AK Singh, BDK Patro
Recent Patents on Computer Science 12 (1), 1-13, 2019
32019
Effect of containers and fungicidal application on the storage of Khasi mandarins.
MS Prasad, MSL Prasad, AK Singh, YP Sharma
32001
Performance analysis of seam diversion based image retargeting technique based on edge detection operators
A Garg, AK Singh
Multimedia Tools and Applications 82 (15), 23207-23250, 2023
22023
Explainable edge AI: a futuristic computing perspective
AE Hassanien, D Gupta, AK Singh, A Garg
Springer Nature, 2022
22022
Intelligence of Things: AI-IoT Based Critical-Applications and Innovations
A Garg, AK Singh, P Rani, N Hussain, RAH Khan, Y Sharma, PK Shukla, ...
22021
The system can't perform the operation now. Try again later.
Articles 1–20