default search action
Hari Om
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j75]Pankaj Kumar, Hari Om:
NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme. Comput. Commun. 213: 296-308 (2024) - [j74]Diksha Rangwani, Hari Om:
Chaotic map based multi-factor authentication protocol for underwater environment monitoring. Multim. Tools Appl. 83(9): 26871-26900 (2024) - [j73]Pankaj Kumar, Hari Om:
Multi-TA model-based conditional privacy-preserving authentication protocol for fog-enabled VANET. Veh. Commun. 47: 100785 (2024) - 2023
- [j72]Arun Kumar Rai, Hari Om, Satish Chand, Chia-Chen Lin:
High-Capacity Reversible Data Hiding Based on Two-Layer Embedding Scheme for Encrypted Image Using Blockchain. Comput. 12(6): 120 (2023) - [j71]Arun Kumar Rai, Hari Om, Satish Chand, Saurabh Agarwal:
Reversible data hiding in encrypted image using two-pass pixel value ordering. J. Inf. Secur. Appl. 76: 103545 (2023) - [j70]Arun Kumar Rai, Hari Om, Satish Chand:
High capacity reversible data hiding in encrypted images using prediction error encoding. Multim. Tools Appl. 82(6): 8345-8358 (2023) - [j69]Usha Sharma, Hari Om, Achyuta Nand Mishra:
HindiSpeech-Net: a deep learning based robust automatic speech recognition system for Hindi language. Multim. Tools Appl. 82(11): 16173-16193 (2023) - [j68]Diksha Rangwani, Hari Om:
4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things. Peer Peer Netw. Appl. 16(1): 35-56 (2023) - [j67]Kartick Sutradhar, Hari Om:
A Privacy-Preserving Comparison Protocol. IEEE Trans. Computers 72(6): 1815-1821 (2023) - [j66]Pankaj Kumar, Hari Om:
An anonymous and authenticated V2I communication with a simplified user revocation and re-registration strategy. J. Supercomput. 79(7): 8070-8096 (2023) - 2022
- [j65]Arun Kumar Rai, Hari Om, Satish Chand:
High-fidelity reversible data hiding technique based on adaptive pairing of prediction errors. Multim. Tools Appl. 81(14): 19637-19653 (2022) - [j64]Pankaj Kumar, Hari Om:
A secure and efficient authentication protocol for wireless applications in multi-server environment. Peer-to-Peer Netw. Appl. 15(4): 1939-1952 (2022) - [j63]Diksha Rangwani, Hari Om:
Four-factor mutual authentication scheme for health-care based on wireless body area network. J. Supercomput. 78(4): 5744-5778 (2022) - [j62]Pankaj Kumar, Hari Om:
A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network. J. Supercomput. 78(16): 17657-17688 (2022) - [j61]Pankaj Kumar, Hari Om:
Secure and efficient cache-based authentication scheme for vehicular ad-hoc networks. Wirel. Networks 28(7): 2821-2836 (2022) - 2021
- [j60]Gaurav Agarwal, Hari Om:
An efficient supervised framework for music mood recognition using autoencoder-based optimised support vector regression model. IET Signal Process. 15(2): 98-121 (2021) - [j59]Ashish Kumar, Hari Om:
An enhanced and provably secure authentication protocol using Chebyshev chaotic maps for multi-server environment. Multim. Tools Appl. 80(9): 14163-14189 (2021) - [j58]Kartick Sutradhar, Hari Om:
A cost-effective quantum protocol for secure multi-party multiplication. Quantum Inf. Process. 20(11): 380 (2021) - [j57]Arun Kumar Rai, Neeraj Kumar, Rajeev Kumar, Hari Om, Satish Chand, Ki-Hyun Jung:
Intra-Block Correlation Based Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling. Symmetry 13(6): 1072 (2021) - [c12]Navneet Raju, Rahul M. Koushik, Hari Om, Subramaniam Kalambur:
ViStA: Video Streaming and Analytics Benchmark. ISPASS 2021: 73-75 - [i1]Kartick Sutradhar, Hari Om:
An Efficient Simulation of Quantum Secret Sharing. CoRR abs/2103.11206 (2021) - 2020
- [j56]Amit Kumar, Hari Om:
Design of a USIM and ECC based handover authentication scheme for 5G-WLAN heterogeneous networks. Digit. Commun. Networks 6(3): 341-353 (2020) - [j55]Kartick Sutradhar, Hari Om:
Efficient quantum secret sharing without a trusted player. Quantum Inf. Process. 19(2): 73 (2020) - [j54]Kartick Sutradhar, Hari Om:
A Generalized Quantum Protocol for Secure Multiparty Summation. IEEE Trans. Circuits Syst. 67-II(12): 2978-2982 (2020)
2010 – 2019
- 2019
- [j53]Nilam Upasani, Hari Om:
A modified neuro-fuzzy classifier and its parallel implementation on modern GPUs for real time intrusion detection. Appl. Soft Comput. 82 (2019) - [j52]Pradeepika Verma, Hari Om:
MCRMR: Maximum coverage and relevancy with minimal redundancy based multi-document summarization. Expert Syst. Appl. 120: 43-56 (2019) - [j51]Choudhary Shyam Prakash, Hari Om, Sushila Maheshkar:
Authentication of medical images using passive approach. IET Image Process. 13(13): 2420-2427 (2019) - [j50]Choudhary Shyam Prakash, Prajwal Pralhad Panzade, Hari Om, Sushila Maheshkar:
Detection of copy-move forgery using AKAZE and SIFT keypoint extraction. Multim. Tools Appl. 78(16): 23535-23558 (2019) - [j49]Pradeepika Verma, Sukomal Pal, Hari Om:
A Comparative Analysis on Hindi and English Extractive Text Summarization. ACM Trans. Asian Low Resour. Lang. Inf. Process. 18(3): 30:1-30:39 (2019) - 2018
- [j48]Ravi Sankar Sangam, Hari Om:
Equi-Clustream: a framework for clustering time evolving mixed data. Adv. Data Anal. Classif. 12(4): 973-995 (2018) - [j47]Ashish Kumar, Hari Om:
An improved and secure multiserver authentication scheme based on biometrics and smartcard. Digit. Commun. Networks 4(1): 27-38 (2018) - [j46]Preeti Chandrakar, Hari Om:
An extended ECC-based anonymity-preserving 3-factor remote authentication scheme usable in TMIS. Int. J. Commun. Syst. 31(8) (2018) - [j45]Sunil Kumar Gautam, Hari Om:
Intrusion detection in RFID system using computational intelligence approach for underground mines. Int. J. Commun. Syst. 31(8) (2018) - [j44]Nabajyoti Mazumdar, Hari Om:
Distributed fuzzy approach to unequal clustering and routing algorithm for wireless sensor networks. Int. J. Commun. Syst. 31(12) (2018) - [c11]Pradeepika Verma, Hari Om:
Fuzzy Evolutionary Self-Rule generation and Text Summarization. ICON 2018: 110-114 - 2017
- [j43]Preeti Chandrakar, Hari Om:
A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC. Comput. Commun. 110: 26-34 (2017) - [j42]Preeti Chandrakar, Hari Om:
Cryptanalysis and improvement of a biometric-based remote user authentication protocol usable in a multiserver environment. Trans. Emerg. Telecommun. Technol. 28(12) (2017) - [j41]Neha Sharma, Hari Om:
Hybrid framework using data mining techniques for early detection and prevention of oral cancer. Int. J. Adv. Intell. Paradigms 9(5/6): 604-622 (2017) - [j40]Preeti Chandrakar, Hari Om:
Cryptanalysis and Security Enhancement of Three-Factor Remote User Authentication Scheme for Multi-Server Environment. Int. J. Bus. Data Commun. Netw. 13(1): 85-101 (2017) - [j39]Nabajyoti Mazumdar, Hari Om:
Distributed fuzzy logic based energy-aware and coverage preserving unequal clustering algorithm for wireless sensor networks. Int. J. Commun. Syst. 30(13) (2017) - [j38]Nabajyoti Mazumdar, Hari Om:
DUCR: Distributed unequal cluster-based routing algorithm for heterogeneous wireless sensor networks. Int. J. Commun. Syst. 30(18) (2017) - [j37]Rishav Singh, Hari Om:
(Two-Dimensional)2 whitening reconstruction for newborn recognition. Multim. Tools Appl. 76(3): 3471-3483 (2017) - [j36]Rishav Singh, Hari Om:
Newborn face recognition using deep convolutional neural network. Multim. Tools Appl. 76(18): 19005-19015 (2017) - [j35]Shipra Kumari, Hari Om:
Cryptanalysis and Improvement of an Anonymous Multi-server Authenticated Key Agreement Scheme. Wirel. Pers. Commun. 96(2): 2513-2537 (2017) - [c10]Preeti Chandrakar, Hari Om:
A Secure and Privacy Preserving Remote User Authentication Protocol for Internet of Things Environment. CICBA (1) 2017: 537-551 - 2016
- [j34]Shipra Kumari, Hari Om:
Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput. Networks 104: 137-154 (2016) - [j33]Prajnamaya Dass, Pranay Kumar Saha, Hari Om:
Improved Traceable-Resistant Efficient Authentication Schemes for Wireless Networks. Int. J. Bus. Data Commun. Netw. 12(2): 28-61 (2016) - [j32]Preeti Chandrakar, Hari Om:
A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme. Int. J. Bus. Data Commun. Netw. 12(2): 62-79 (2016) - [j31]Amit Kumar, Hari Om:
Lightweight, ECC based RFID Authentication Scheme for WLAN. Int. J. Bus. Data Commun. Netw. 12(2): 89-103 (2016) - [j30]Pratik Ranjan, Hari Om:
An Efficient Remote User Password Authentication Scheme based on Rabin's Cryptosystem. Wirel. Pers. Commun. 90(1): 217-244 (2016) - 2015
- [j29]Chiranjeevi Manike, Hari Om:
Modified GUIDE (LM) algorithm for mining maximal high utility patterns from data streams. Int. J. Comput. Intell. Syst. 8(3): 517-529 (2015) - [j28]Shipra Kumari, Hari Om:
Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint. KSII Trans. Internet Inf. Syst. 9(12): 4987-5014 (2015) - [j27]Ravi Sankar Sangam, Hari Om:
Hybrid data labeling algorithm for clustering large mixed type data. J. Intell. Inf. Syst. 45(2): 273-293 (2015) - [j26]Neha Sharma, Hari Om:
GMDH polynomial and RBF neural network for oral cancer classification. Netw. Model. Anal. Health Informatics Bioinform. 4(1): 13 (2015) - [j25]Hari Om, Mantosh Biswas:
A generalized image denoising method using neighbouring wavelet coefficients. Signal Image Video Process. 9(1): 191-200 (2015) - [c9]Amit Kumar, Hari Om:
A Secure Seamless Handover Authentication Technique for Wireless LAN. ICIT 2015: 43-47 - [c8]Sunil Kumar Gautam, Hari Om:
Host-Based Intrusion Detection Using Statistical Approaches. FICTA 2015: 481-493 - [c7]Pratik Ranjan, Hari Om:
An efficient undeniable signature scheme using braid groups. IC3 2015: 516-520 - 2014
- [j24]Neha Sharma, Hari Om:
Using MLP and SVM for predicting survival rate of oral cancer patients. Netw. Model. Anal. Health Informatics Bioinform. 3(1) (2014) - [j23]Neha Sharma, Hari Om:
Significant patterns for oral cancer detection: association rule on clinical examination and history data. Netw. Model. Anal. Health Informatics Bioinform. 3(1) (2014) - [c6]Shipra Kumari, Hari Om:
Remote Login Password Authentication Scheme Based on Cuboid Using Biometric. ICIT 2014: 190-194 - [c5]Shipra Kumari, Hari Om:
Remote Login Password Authentication Scheme Using Tangent Theorem on Circle. FICTA (2) 2014: 721-728 - [c4]Shipra Kumari, Hari Om:
A modified remote authentication method with smartcards and check digits. ICDSE 2014: 206-209 - [c3]Chiranjeevi Manike, Hari Om:
Time-Efficient Tree-Based Algorithm for Mining High Utility Patterns. ISI (1) 2014: 409-418 - 2013
- [j22]Neha Sharma, Hari Om:
Data mining models for predicting oral cancer survivability. Netw. Model. Anal. Health Informatics Bioinform. 2(4): 285-295 (2013) - 2012
- [c2]Mantosh Biswas, Hari Om:
Selective Parameters Based Image Denoising Method. ISI 2012: 325-332 - [c1]Hari Om, Aritra Kundu:
A hybrid system for reducing the false alarm rate of anomaly intrusion detection system. RAIT 2012: 131-136 - 2010
- [j21]Satish Chand, Hari Om:
Efficient staircase scheme with seamless channel transition mechanism. Comput. Networks 54(3): 462-474 (2010) - [j20]Hari Om, Tapas K. Sarkar:
Designing Intrusion Detection System for Web Documents Using Neural Network. Commun. Netw. 2(1): 54-61 (2010)
2000 – 2009
- 2009
- [j19]Satish Chand, Bijendra Kumar, Hari Om:
Segmented patching broadcasting protocol for video data. Comput. Commun. 32(4): 679-684 (2009) - [j18]Satish Chand, Hari Om:
Storage space estimation for videos using fading channels. Digit. Signal Process. 19(2): 287-296 (2009) - [j17]Satish Chand, Bijendra Kumar, Hari Om:
Video Data Delivery using Slotted Patching. J. Netw. Comput. Appl. 32(3): 660-665 (2009) - 2008
- [j16]Satish Chand, Bijendra Kumar, Hari Om:
Patching-based broadcasting scheme for video services. Comput. Commun. 31(10): 1970-1978 (2008) - [j15]Satish Chand, Hari Om:
Phase estimation in data channelization for video transmitting. Multidimens. Syst. Signal Process. 19(2): 247-256 (2008) - [j14]Satish Chand, Hari Om:
Efficient utilization of buffer storage in conservative staircase broadcasting scheme. IEEE Trans. Consumer Electron. 54(3): 1360-1368 (2008) - 2007
- [j13]Satish Chand, Hari Om:
Modeling of Buffer Storage in Video Transmission. IEEE Trans. Broadcast. 53(4): 774-779 (2007) - [j12]Satish Chand, Hari Om:
Geometrico-Harmonic Data Broadcasting and Receiving Scheme for Popular Videos. IEEE Trans. Circuits Syst. Video Technol. 17(1): 16-25 (2007) - [j11]Hari Om, Satish Chand:
Geometrico-Harmonic Broadcasting Scheme With Continuous Redundancy. IEEE Trans. Multim. 9(2): 410-419 (2007) - 2006
- [j10]Satish Chand, Hari Om:
Generalized conservative staircase data broadcasting protocol for video-on-demand. IEEE Trans. Consumer Electron. 52(2): 363-370 (2006) - [j9]Satish Chand, Hari Om:
Seamless channel transition for cautious harmonic scheme in video data broadcasting. IEEE Trans. Consumer Electron. 52(3): 719-725 (2006) - [j8]Satish Chand, Bijendra Kumar, Hari Om:
Request based data delivery in video-on-demand services. IEEE Trans. Consumer Electron. 52(4): 1318-1324 (2006) - 2005
- [j7]Satish Chand, Hari Om:
Modified polyharmonic data broadcasting scheme for popular videos. IEEE Trans. Consumer Electron. 51(4): 1153-1158 (2005) - [j6]Satish Chand, Hari Om:
Seamless channel transition using Bespoke broadcasting scheme for video-on-demand service. IEEE Trans. Consumer Electron. 51(4): 1313-1318 (2005) - 2004
- [j5]Hari Om:
Partially prestored harmonic data broadcasting scheme for popular videos. IEEE Trans. Consumer Electron. 50(2): 709-714 (2004) - 2003
- [j4]Satish Chand, Hari Om:
Bespoke data broadcasting scheme for popular videos. IEEE Trans. Consumer Electron. 49(1): 193-197 (2003) - [j3]Satish Chand, Hari Om:
Buffer evaluation in variable bandwidth channelization for videos. IEEE Trans. Consumer Electron. 49(2): 354-358 (2003) - [j2]Satish Chand, Hari Om:
Modified bespoke data broadcasting scheme for popular videos. IEEE Trans. Consumer Electron. 49(4): 1378-1382 (2003) - 2002
- [j1]Satish Chand, Hari Om:
Modified staircase data broadcasting scheme for popular videos. IEEE Trans. Broadcast. 48(4): 274-280 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-12 22:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint