Hemraj Saini

Orcid: 0000-0003-2957-1491

According to our database1, Hemraj Saini authored at least 46 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A trusted and adaptive security mechanism for wearable e-healthcare systems.
Int. J. Ad Hoc Ubiquitous Comput., 2024

2023
User authentication of industrial internet of things (IIoT) through Blockchain.
Multim. Tools Appl., May, 2023

MVI and Forecast Precision Upgrade of Time Series Precipitation Information for Ubiquitous Computing.
Informatica (Slovenia), 2023

2022
Secure Blockchain-Internet of Vehicles (B-IoV) Mechanism using DPSO and M-ITA Algorithms.
J. Inf. Secur. Appl., 2022

Blockchain-based raw material shipping with PoC in Hyperledger Composer.
Comput. Sci. Inf. Syst., 2022

Prediction of malicious objects using prey-predator model in Internet of Things (IoT) for smart cities.
Comput. Ind. Eng., 2022

Security Analysis of User Authentication and Methods.
Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing, 2022

2021
Design of fuzzy controlled routing protocol to save energy in ad hoc networks.
Int. J. Serv. Technol. Manag., 2021

COVID-19 outbreak in Orissa: MLR and H-SVR-based modelling and forecasting.
Int. J. Comput. Appl. Technol., 2021

Towards a Multimodal System for Precision Agriculture using IoT and Machine Learning.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

2020
A trust computed framework for IoT devices and fog computing environment.
Wirel. Networks, 2020

A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology.
Multim. Tools Appl., 2020

A resilient and secure two-stage ITA and blockchain mechanism in mobile crowd sourcing.
J. Ambient Intell. Humaniz. Comput., 2020

Fog assisted task allocation and secure deduplication using 2FBO2 and MoWo in cluster-based industrial IoT (IIoT).
Comput. Commun., 2020

2019
Probabilistic Verification Scenarios with Reduced Authentication Delay for Handoff Clients in Mesh Networks.
Wirel. Pers. Commun., 2019

A novel four-tier architecture for delay aware scheduling and load balancing in fog environment.
Sustain. Comput. Informatics Syst., 2019

A Secure, Energy- and SLA-Efficient (SESE) E-Healthcare Framework for Quickest Data Transmission Using Cyber-Physical System.
Sensors, 2019

Energy and SLA Efficient Virtual Machine Placement in Cloud Environment Using Non-Dominated Sorting Genetic Algorithm.
Int. J. Inf. Secur. Priv., 2019

Behavioral Modeling of Malicious Objects in a Highly Infected Network Under Quarantine Defence.
Int. J. Inf. Secur. Priv., 2019

A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques.
Int. J. Inf. Secur. Priv., 2019

Secure handoff technique with reduced authentication delay in wireless mesh network.
Int. J. Adv. Intell. Paradigms, 2019

Efficient Solution for Load Balancing in Fog Computing Utilizing Artificial Bee Colony.
Int. J. Ambient Comput. Intell., 2019

Effect of Vaccination in the Computer Network for Distributed Attacks - A Dynamic Model.
Proceedings of the Advances in Computing and Data Sciences, 2019

2018
Aspects of Trusted Routing Communication in Smart Networks.
Wirel. Pers. Commun., 2018

Correlation and Performance Estimation of Clone Detection Tools.
Int. J. Open Source Softw. Process., 2018

Security Against Network Layer Attacks for Hierarchal Mesh Environments.
Int. J. Inf. Technol. Web Eng., 2018

Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN.
Int. J. Inf. Secur. Priv., 2018

Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN.
Int. J. Inf. Secur. Priv., 2018

Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification.
Int. J. Inf. Secur. Priv., 2018

Energy efficient virtual machine consolidation for cloud data centres using analytic hierarchy process.
Int. J. Adv. Intell. Paradigms, 2018

Deployment Consideration on Secure Computation for Radix-16 Scalar Multiplication.
Proceedings of the Advances in Computing and Data Science, 2018

2017
Novel Noncommutative Cryptography Scheme Using Extra Special Group.
Secur. Commun. Networks, 2017

Non-Trivial Software Clone Detection Using Program Dependency Graph.
Int. J. Open Source Softw. Process., 2017

Secure Modified Ad Hoc On-Demand Distance Vector (MAODV) Routing Protocol.
Int. J. Mob. Comput. Multim. Commun., 2017

A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security.
Int. J. Mob. Comput. Multim. Commun., 2017

SLA and Performance Efficient Heuristics for Virtual Machines Placement in Cloud Data Centers.
Int. J. Grid High Perform. Comput., 2017

Weight Trusted Routing Mechanism for Hierarchical Mesh Environments.
Int. J. Distributed Syst. Technol., 2017

Performance Evaluation of VM Placement Using Classical Bin Packing and Genetic Algorithm for Cloud Environment.
Int. J. Bus. Data Commun. Netw., 2017

Secure Buffer-Based Routing Protocol for WMN.
Int. J. Bus. Data Commun. Netw., 2017

Mathematical Model for Cyber Attack in Computer Network.
Int. J. Bus. Data Commun. Netw., 2017

2016
Secure and Efficient ECC: Radix-16 Scalar Multiplication without Pre-Computation.
Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, 2016

2012
Extended Cell Planning for Capacity Expansion and Power Optimization by Using MEMETIC Algorithm.
Int. J. Wirel. Networks Broadband Technol., 2012

2011
Computing the Spreading Power of a Business Portal to Propagate the Malicious Information in the Network.
Int. J. Web Portals, 2011

2010
Cyber Defense Architecture for Campus Intranet.
Proceedings of the 2010 International Conference on Security & Management, 2010

Extended Secure Architecture of HIS: HL7.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2010

2008
Class Level Test Case Generation in Object Oriented Software Testing.
Int. J. Inf. Technol. Web Eng., 2008


  Loading...