Vinod Pathari

Orcid: 0000-0002-2601-5265

According to our database1, Vinod Pathari authored at least 14 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Proof-of-Variable-Authority: A Blockchain Consensus Mechanism for Securing IoT Networks.
Proceedings of the Information Systems Security - 19th International Conference, 2023

2022
A private Ethereum blockchain implementation for secure data handling in Internet of Medical Things.
J. Reliab. Intell. Environ., 2022

2019
A model for measuring and ranking a firm's patent portfolio.
Technol. Anal. Strateg. Manag., 2019

2018
A Data Science - Centered Approach to Studying International Relations and Foreign Policies.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

News Article Classification with Clustering using Semi-Supervised Learning.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

A Novel Approach for Youtube Video Spam Detection using Markov Decision Process.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

2017
Misclassifications: The missing link.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

2016
A survey of applications of threshold cryptography - proposed and practiced.
Inf. Secur. J. A Glob. Perspect., 2016

Multi-factor authentication using threshold cryptography.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Multiple integer packing for optimizing partial homomorphic encrypted databases.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

2013
Deriving an information security assurance indicator at the organizational level.
Inf. Manag. Comput. Secur., 2013

Generalized Architecture to Capture End to End Provenance in a System.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
Identifying linkages between statements in information security policy, procedures and controls.
Inf. Manag. Comput. Secur., 2012

2006
K-RTP: A Reliable Transport Layer Protocol for Wireless Sensor Networks.
Proceedings of the Sixth IASTED International Multi-Conference on Wireless and Optical Communications: Conference on Communication Systems and Applications, 2006


  Loading...