Research & Publication
The Evolution of Technology Acceptance Model: A Literature Review, International Journal of Research in Computer Application & Management ISSN: 2231-1009, Volume 3 Issue 5 May 2013 Page No.15-21.
Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System, International Journal Of Engineering And Computer Science ISSN:2319-7242, Volume 3 Issue 4 April 2014 Page No. 5215-5223
Data Security Algorithms for Cloud Storage System using Cryptographic Method, International Journal of Scientific and Engineering Research (IJSER) Volume 5, Issue3, March 2014 Edition (ISSN 2229-5518).
Graph Structured Data Security using Trusted Third Party Query Process in Cloud Computing, by International Journal of Computer Network and Information Security (IJCNIS), ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online), Vol. 7, No. 7, June 2015.
Performance Evaluation of IEEE 802.11ac and 802.11n using NS3, Indian Journal of Science and Technology, Vol 9(26), DOI: 10.17485/ijst/2016/v9i26/93565, July 2016.
Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System, IEEE International Conference on Signal Propagation and Computer Technology (ICSPCT 2014), IEEE Conference Record # 33295, ISBN: 978-1-4799-3140-8.
Efficient Data Security Method to control data in cloud storage System using Cryptographic Method, IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), May 09-11, 2014, Jaipur India.
Multi-Layered Security for Private Communication, International Conference on Recent Trends in Engineering Science and Management (ICRTESM), March 15, 2015, JNU, Convention Center, New Delhi.
Innovative Road Map for Leveraging ICT Enabled Tools for Energy Efficiency – From Awareness to Adoption, IEEE Xplore International Conference on Advances in Computing and Communication Engineering (ICACCE-2015), May 01-02, 2015, Dehradun India, DOI 10.1109/ICACCE.2015.45