Follow
Manisha Y. Joshi
Manisha Y. Joshi
Professor , Department of CSE , M.G.M.'s College of Engineering, Nanded (India)
Verified email at mgmcen.ac.in
Title
Cited by
Cited by
Year
Performance analysis of AODV & DSR routing protocol in mobile ad hoc networks
AN Thakare, MY Joshi
IJCA Special Issue on MANETs 4, 211-218, 2010
632010
Robust image watermarking based on singular value decomposition and discrete wavelet transform
MY Joshi
2010 3rd International conference on computer science and information …, 2010
342010
All frequency band DWT-SVD robust watermarking technique for color images in YUV color space
SK Bhagyashri, MY Joshi
2011 IEEE International Conference on Computer Science and Automation …, 2011
312011
A simple and efficient solution to remote user authentication using smart cards
M Misbahuddin, MA Ahmed, MH Shastri
2006 Innovations in Information Technology, 1-5, 2006
212006
Scalable key transport protocol using Chinese remainder theorem
MY Joshi, RS Bichkar
Security in Computing and Communications: International Symposium, SSCC 2013 …, 2013
62013
Analysis on logical key hierarchy and variants for secure group communication
AS Pande, Y Joshi, MY Joshi
Computing, Communication and Signal Processing: Proceedings of ICCASP 2018 …, 2018
32018
Analysis of Tree structure for Secure Group Communication Using LKH Approach
A Pande, DY Joshi, D Joshi, D Wadhwa
Int. J. Comput. Sci. Eng 7, 1130-1136, 2019
22019
A centralized key table based communication efficient group key management protocol
MY Joshi, RS Bichkar
Int. J. Comput. Netw. Inf. Secur.(8), 49-55, 2015
22015
Optimal Tree Structure for Secure Group Communication Using LKH Approach
A Pande, DYV Joshi, DM Joshi, DL Wadhwa
2nd International Conference on Communication & Information Processing (ICCIP), 2020
2020
Enhanced Strict Binary Logical Key Hierarchy Algorithm for Secure Group Communication
AS Pande, YV Joshi, MY Joshi
Computing in Engineering and Technology: Proceedings of ICCET 2019, 239-251, 2019
2019
Cloud Data Security Using Third Party Auditor
MYJ Aman Bhimrao Kamble
International Journal of Scientific Research in Science, Engineering and …, 2018
2018
A Secure End-To-End Protocol for Secure Transmission of SMS
VV Mantri, MY Joshi
International Journal of Science and Research (IJSR), Volume 7 Issue 4 PP …, 2018
2018
A Secure End-To-End Protocol for Secure Transmission of SMS
MYJ Vaidehi V. Mantri
International Journal of Science and Research 7 (4), 1024-1047, 2018
2018
Secure Forensic Report Retrieval Application using Cipher Text-Policy Attribute-Based Encryption
MYJ Vinod I. Jondhale
International Journal of Science and Research (IJSR) 7 (4), 980-983, 2018
2018
Classification of Concept Drifting Data Streams Using Adaptive Novel - Class Detection
MYJ Aparna Yeshwantrao Ladekar
International Journal of Computer Engineering In Research Trends 3 (9), 514-520, 2016
2016
On the analysis and design of key management systems for secure communication
MY Joshi
Swami Ramanand Teerth Marathwada University , Vishnupuri Nanded, 2015
2015
An Efficient Group Key Transport Protocol
MY Joshi, RS Bichkar
International Journal of Computer Science and Information Technologies, Vol …, 2014
2014
An authenticated key transport protocol using symmetric encryption
MY Joshi, RS Bichkar
2010 3rd International Conference on Computer Science and Information …, 2010
2010
Analysis of academic data using Ad-hoc association rule mining from star schema
MYJ Navin Kumar
International Seminar on IT in Academics, (ITA-2009), Sinhgad college of …, 2009
2009
The Advantages Of Elliptic Curve Cryptography For Wireless Security
MYJ Mr. Praful Pardhi
International conference on Emerging trends in computing electronics …, 2008
2008
The system can't perform the operation now. Try again later.
Articles 1–20