From Saint Chavara
Sl No | Year | Stream | Sem | Branch | Subject |
---|---|---|---|---|---|
1 | 2024 | B.Tech. | S6 | CS-C | NETWORKING LAB |
2 | 2024 | B.Tech. | S4 | CS-B | COMPUTER ORGANIZATION AND ARCHITECTURE |
3 | 2024 | B.Tech. | S2 | CS-A | LOGIC SYSTEM DESIGN |
4 | 2024 | B.Tech. | S2 | CS-A | LOGIC SYSTEM DESIGN LAB |
5 | 2023 | B.Tech. | S7 | CS-A | SEMINAR |
6 | 2023 | B.Tech. | S5 | CS-C | MICROPROCESSORS AND MICROCONTROLLERS |
7 | 2023 | B.Tech. | S5 | CS-C | DATABASE MANAGEMENT SYSTEMS LAB |
8 | 2023 | B.Tech. | S5 | CS-A | DATABASE MANAGEMENT SYSTEMS LAB |
9 | 2023 | B.Tech. | S4 | CS-A | ANDROID PROGRAMMING |
10 | 2023 | B.Tech. | S3 | CS-C | DESIGN AND ENGINEERING |
11 | 2023 | B.Tech. | S2 | EC-C | PROGRAMMING IN C |
12 | 2022 | B.Tech. | S8 | CS-C | DATA SCIENCE |
13 | 2022 | B.Tech. | S8 | CS-B | DATA SCIENCE |
14 | 2022 | B.Tech. | S8 | CS-A | DATA SCIENCE |
15 | 2022 | B.Tech. | S6 | CS-A | NETWORKING LAB |
16 | 2022 | B.Tech. | S5 | CS-C | DATABASE MANAGEMENT SYSTEMS LAB |
17 | 2022 | B.Tech. | S5 | CS-B | MANAGEMENT OF SOFTWARE SYSTEMS |
18 | 2022 | B.Tech. | S5 | CS-B | DATABASE MANAGEMENT SYSTEMS LAB |
19 | 2022 | B.Tech. | S5 | CS-A | MANAGEMENT OF SOFTWARE SYSTEMS |
20 | 2022 | B.Tech. | S5 | CS-A | DATABASE MANAGEMENT SYSTEMS LAB |
21 | 2022 | B.Tech. | S2 | ME-A | PROGRAMMING IN C |
22 | 2021 | B.Tech. | S7 | CS-C | DISTRIBUTED COMPUTING |
23 | 2021 | B.Tech. | S7 | CS-B | PROGRAMMING PARADIGMS |
24 | 2021 | B.Tech. | S5 | CS-C | DATABASE MANAGEMENT SYSTEMS LAB |
25 | 2021 | B.Tech. | S5 | CS-A | DATABASE MANAGEMENT SYSTEMS LAB |
Year | Title of the Paper-Conference/Journal Details |
2022 | Astrengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption Information and Computation, Elsevier |
2021 | A Provably Secure Identity Based Authenticated Key Agreement Protocol with Multiple PKG Compatibility for Inter-Vehicular Ad hoc Networks Journal of Integrated Design and Process Science |
2021 | Comorbidity Based Risk Prediction System for ARDS in COVID-19 Patients International Conference on Advanced Computer Control, ICACC |
2020 | An efficient eCK secure identity based Two Party Authenticated Key Agreement scheme with security against active adversaries Information and Computation, Elsevier |
2019 | An Efficient eCK Secure Certificateless Authenticated Key Agreement Scheme with Security Against Public Key Replacement Attacks Journal of information security and applications |
2018 | An Efficient Forward Secure Authenticated Encryption Scheme with Ciphertext Authentication Based on Two Hard Problems Advances in Big Data and Cloud Computing |
2018 | A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography Journal of King Saud University-Computer and Information Sciences |
2017 | Analysis of hierarchical identity based encryption schemes and its applicability to computing environments Journal of information security and applications |
2016 | Deriving Practical Applicability of Hierarchical Identity Based Encryption in Massively Multiplayer Online Role Playing Games International Conference on Advances in Computing and Communications |
2013 | A Trusted Integrity Verification Architecture for Commodity Computers International Journal of Computer Applications Technology and Research |
2013 | Launch Time Application Security: The Trusted Approach International Journal of Science and Research |
2013 | Towards a Trust Envisioned Cyber Security International Journal of Innovation and Applied Studies |
Year | Date of Publication | Title of the Book | Published By | Edition |
2019 | 17-Mar-2020 | The Cognitive Approach in Cloud Computing and Internet of Things Technologies for Surveillance Tracking Systems | Academic Press, Elsevier | 9780128163856 |