Follow
Shefalika Samaddar
Shefalika Samaddar
Professor of Computer Science and Engineering, Dr Sudhir Chandra Sur Institute of Technology and Sports complex
Verified email at dsec.ac.in
Title
Cited by
Cited by
Year
Different flavours of man-in-the-middle attack, consequences and feasible solutions
GN Nayak, SG Samaddar
2010 3rd International Conference on Computer Science and Information …, 2010
1272010
Theories and Application of Time Variant Key in RSA and that with selective encryption in AES
CT Bhunia, G Mondal, S Samaddar
Proc. EAIT, Elsevier Publications, Calcutta CSI-06, 219-221, 2006
272006
Enhancing VPN security through security policy management
AK Singh, SG Samaddar, AK Misra
2012 1st International Conference on Recent Advances in Information …, 2012
222012
An efficient web mining algorithm for Web Log analysis: E-Web Miner
MP Yadav, PK Keserwani, SG Samaddar
2012 1st International Conference on Recent Advances in Information …, 2012
222012
Komal chaul–A potential candidate for geographical indication
SG Samaddar, AB Samaddar
CSIR, 2010
182010
Service oriented architecture based SDI model for geographical indication web services
RK Barik, AB Samaddar, SG Samaddar
International Journal of Computer Applications 25 (4), 42-49, 2011
172011
Practical insights into intellectual property strategy for a technical institute
SG Samaddar, BD Chaudhary
CSIR, 2008
172008
A dynamic model for evaluation of usefulness of faculty development programmes in the area of business management
S Nandan, SG Samaddar, T Nandan
Serbian Journal of Management 5 (2), 251-259, 2010
122010
A robust lightweight ECC-based three-way authentication scheme for IoT in cloud
S Chatterjee, SG Samaddar
Smart Computing Paradigms: New Progresses and Challenges: Proceedings of …, 2020
112020
Extending IEEE LTSA e-Learning framework in secured SOA environment
P Kumar, SG Samaddar, AB Samaddar, AK Misra
2010 2nd International Conference on Education Technology and Computer 2, V2 …, 2010
112010
Digital forensic enabled image authentication using least significant bit (lsb) with tamper localization based hash function
UK Das, SG Samaddar, PK Keserwani
Intelligent Communication and Computational Technologies: Proceedings of …, 2018
102018
A decision support system in healthcare prediction
AK Mishra, PK Keserwani, SG Samaddar, HB Lamichaney, AK Mishra
Advanced Computational and Communication Paradigms: Proceedings of …, 2018
92018
Enhancing Koyama Scheme Using Selective Encryption Technique in RSA-based Singular Cubic Curve with AVK.
K Singh, SG Samaddar
Int. J. Netw. Secur. 14 (3), 164-172, 2012
92012
Tools and Techniques in optimization of Network Resources
MSA Ansari, MC Govil, K Pal, SG Samaddar
2020 3rd International Conference on Emerging Technologies in Computer …, 2020
82020
Communication based vulnerabilities and script based solvabilities
AK Singh, P Tewari, SG Samaddar, AK Misra
Proceedings of the 2011 International Conference on Communication, Computing …, 2011
82011
Recognition techniques in Buddhist iconography and challenges
G Bhaumik, SG Samaddar, AB Samaddar
2018 international conference on advances in computing, communications and …, 2018
52018
A comparative study of machine learning methods for generation of digital forensic validated data
N Kumar, PK Keserwani, SG Samaddar
2017 ninth international conference on advanced computing (ICoAC), 15-20, 2017
52017
Vulnerabilities of Electronics Communication: solution mechanism through script
AK Singh, P Tewari, SG Samaddar, AK Misra
International Journal of Computer Science Issues (IJCSI) 8 (3), 2011
52011
Customization of Service level agreement for digital forensics as a service
PK Keserwani, SG Samaddar
Proceedings of the 7th International Conference on Computer and …, 2017
42017
Increasing robustness of RC4 family for automated selection of ciphersuites
AK Singh, SG Samaddar, SR Sahoo, G Mathew
Procedia Engineering 30, 45-52, 2012
42012
The system can't perform the operation now. Try again later.
Articles 1–20