Comparative study between stream cipher and block cipher using RC4 and Hill Cipher S Ahmad, MR Beg, Q Abbas, J Ahmad, S Atif International Journal of Computer Applications 1 (25), 0975-8887, 2010 | 14 | 2010 |
Meet In The Middle Attack: A Cryptanalysis Approach S Ahmad, MR Beg, J Ahmad, N Barua International Journal of Computer Applications 975 (1), 1-7, 2010 | 3 | 2010 |
A Solution for Detecting Black Hole Attack Using Improved DRI in MANET A Parveen, S Ahmad, J Ahmad SAMRIDDHI: A Journal of Physical Sciences, Engineering and Technology 6 (01 …, 2014 | 1 | 2014 |
A Multilayered Heuristic for Solving Curricula Scheduling Problems A Ahmed, M Atif, J Ahmad Journal of Applied and Emerging Sciences 5 (1), pp7-11, 2016 | | 2016 |
NSGA based optimization of Al-Mg Alloy sheet using laser welding J Ahmad, S Pandey VSRD International Journal of Computer Science and Information Technology 4 (9), 2014 | | 2014 |
Mapping of Conceptual Fuzzy Object Oriented Data Model into Logical Schema J Ahmad, shivam Singh International Journal of Applied Engineering and Technology 4 (2), 2014 | | 2014 |
MAPPING OF CONCEPTUAL FUZZY OBJECT ORIENTED DATA MODEL INTO LOGICAL SCHEMA S Singh, K Agarwal, J Ahmad | | 2014 |
A COST EFFECTIVE DEADLOCK RECOVERY SCHEME FOR ADAPTIVE WORMHOLE ROUTED NETWORKS DBEG J AHMAD, AA ZILLI GLOBAL JOURNAL OF MULTIDISCIPLINARY STUDIES 3 (11), 2014 | | 2014 |
DEVELOPMENT OF A FRAMEWORK FOR PRESERVING PRIVATE DATA IN WEB DATA MINING S Ahmad, S Ahmad, J Ahmad International Journal of Technical Research and Applications 2 (5), 34-36, 2014 | | 2014 |
CONCEPTUAL MODELING IN FUZZY OBJECT-ORIENTED DATABASES USING UNIFIED MODELING LANGUAGE JA S Singh, K Agarwal | | 2013 |
Proceedings of the 3rd Symposium on Engineering Sciences J Ahmed, SZH Rizvi, R Ahmad, M Saleem | | 2010 |
Solution of Looping Problem in Learning Bridges J Ahmad, MR Beg, S Ahmad, M Danish International Journal of Computer Applications 975, 8887, 2010 | | 2010 |
Shish Ahmad DR. Mohd. Rizwan beg Jameel Ahmad Mohd. Danish J Ahmad | | 2010 |
Shish Ahmad DR. Mohd. Rizwan beg Jameel Ahmad Nabarun Barua J Ahmad | | 2010 |
Solution of Looping Problem in Learning Bridges D Jameel ahmad, shish ahmad, R. Beg IJCA 1 (25), 2010 | | 2010 |
Comparative study between stream cipher and block cipher using RC4 and Hill Cipher SA S Ahmad, MR Beg, Q Abbas, J Ahmad IJCA 1 (25), 2010 | | 2010 |
A peer to Peer Architecture for Resource Discovery J Ahmad National Conference on Emerging Technologies, 2008 | | 2008 |
A General Framework of Wireless Sensor Networks S Ahmad, J Ahmad National Conference on Emerging Technologies, 2008 | | 2008 |
Threats of Network Security S Ahmad, J Ahmad National Conference on Emerging Technologies, 2008 | | 2008 |
Selective Pipeline Paging Scheme to Reduce Paging Cost in PCS Networks R Tripathi, J Ahmad, S Ahmad National Conference on Emerging Technologies, 2007 | | 2007 |