Остановите войну!
for scientists:
default search action
Durgesh Kumar Mishra
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c17]Kamlesh Chandravanshi, Gaurav Soni, Durgesh Kumar Mishra:
A Method for Load Balancing and Energy Optimization in Cloud Computing Virtual Machine Scheduling. UKCI 2023: 325-335 - 2022
- [j3]Kamlesh Chandravanshi, Gaurav Soni, Durgesh Kumar Mishra:
Design and Analysis of an Energy-Efficient Load Balancing and Bandwidth Aware Adaptive Multipath N-Channel Routing Approach in MANET. IEEE Access 10: 110003-110025 (2022) - 2021
- [c16]Ajai Mishra, Dharm Singh Jat, Durgesh Kumar Mishra:
Machine Intelligence for Predicting New Start-ups Success: A Survey. DSMLAI 2021: 99-105
2010 – 2019
- 2019
- [c15]Priyanshu Jadon, Deepshikha Bhatia, Durgesh Kumar Mishra:
A BigData approach for sentiment analysis of twitter data using Naive Bayes and SVM Algorithm. WOCN 2019: 1-6 - [e2]Durgesh Kumar Mishra, Xin-She Yang, Aynur Unal:
Data Science and Big Data Analytics, ACM-WIR 2018, Women In Research 2018, Indore, India, 5-6 January 2018. Lecture Notes on Data Engineering and Communications Technologies 16, Springer 2019, ISBN 978-981-10-7640-4 [contents] - 2018
- [c14]Rashid Sheikh, Durgesh Kumar Mishra:
Secure Sum Computation Using Homomorphic Encryption. WIR 2018: 357-363 - 2016
- [c13]Rashid Sheikh, Durgesh Kumar Mishra:
Secure Sum Computation for Insecure Networks. ICTCS 2016: 102:1-102:7 - [c12]Kamlesh Ahuja, Durgesh Kumar Mishra, Sarika Jain:
A Survey Paper on a Compact Data Structure Based Technique for Mining Frequent Closed Item Set. WIR 2016: 139-141 - [e1]Durgesh Kumar Mishra, Rashid Sheikh, Sarika Jain:
WIR '16: Women in Research 2016, Indore India, March, 2016. ACM 2016, ISBN 978-1-4503-4278-0 [contents] - 2014
- [i7]Samiksha Shukla, G. Sadashivappa, Durgesh Kumar Mishra:
Simulation of Collision Resistant Secure Sum Protocol. CoRR abs/1411.7756 (2014) - 2012
- [c11]Shubham Joshi, Durgesh Kumar Mishra:
A survey on threats in routing security in manet for trust management using SMC protocols. WOCN 2012: 1-6 - 2011
- [j2]Rashid Sheikh, Durgesh Kumar Mishra, Beerendra Kumar:
Secure Multiparty Computation: From Millionaires Problem to Anonymizer. Inf. Secur. J. A Glob. Perspect. 20(1): 25-33 (2011) - [c10]Nitika Vats Doohan, Durgesh Kumar Mishra, Sanjeev Tokekar:
Reliability Analysis for Wireless Sensor Networks Considering Environmental Parameters Using MATLAB. CICSyN 2011: 99-102 - [c9]Kavita Choudhary, Umasanker Pandey, Malay Kumar Nayak, Durgesh Kumar Mishra:
Electronic Data Interchange: A Review. CICSyN 2011: 323-327 - 2010
- [j1]Durgesh Kumar Mishra, Manohar Chandwani:
A Secured MultiParty Computational Protocol to Protect Cyber Space. Inf. Secur. J. A Glob. Perspect. 19(4): 175-181 (2010) - [c8]Arpit Ludhiyani, Rohit Pathak, Satyadhar Joshi, Durgesh Kumar Mishra:
Strategic Game theory models and commercialization for Nano RFID systems. WOCN 2010: 1-5 - [c7]Durgesh Kumar Mishra, Rohit Pathak, Satyadhar Joshi, Arpit Ludhiyani:
Secure Multi-Party Computation for statistical computations using virtual parties on a Token Ring Network. WOCN 2010: 1-6 - [c6]Rohit Pathak, Satyadhar Joshi, Durgesh Kumar Mishra, Arpit Ludhiyani:
Tri-TTP based architecture for Secure Multi-Party Computations using Virtual Parties. WOCN 2010: 1-6 - [c5]Rashid Sheikh, Mahakal Singh Chande, Durgesh Kumar Mishra:
Security issues in MANET: A review. WOCN 2010: 1-4 - [i6]Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra:
Changing Neighbors k Secure Sum Protocol for Secure Multi Party Computation. CoRR abs/1002.2409 (2010) - [i5]Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra:
A Modified ck-Secure Sum Protocol for Multi-Party Computation. CoRR abs/1002.4000 (2010) - [i4]Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra:
A Distributed k-Secure Sum Protocol for Secure Multi-Party Computations. CoRR abs/1003.4071 (2010)
2000 – 2009
- 2009
- [c4]Ajita Satheesh, Durgesh Kumar Mishra, Ravindra Patel:
Classification Rule Mining for Object Oriented Databases: A Brief Review. CICSyN 2009: 259-263 - [c3]Zulfa Shaikh, Dinesh Bhati, D. M. Puntambekar, Pushpa Pathak, Durgesh Kumar Mishra:
Congestion Control during Data Privacy in Secure Multiparty Computation. ICETET 2009: 330-332 - [c2]Kamal K. Sethi, Durgesh Kumar Mishra, Gopal Solanki, Bharat Mishra:
Key Issues of Security and Integrity in Third Party Association Rule Mining. ICETET 2009: 337-340 - [c1]Richa Gupta, Sanjiv Tokekar, Durgesh Kumar Mishra:
A Paramount Pair of Cache Replacement Algorithms on L1 and L2 Using Multiple Databases with Security. ICETET 2009: 346-351 - [i3]Durgesh Kumar Mishra, Neha Koria, Nikhil Kapoor, Ravish Bahety:
A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining. CoRR abs/0908.0994 (2009) - [i2]Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra:
Privacy Preserving k Secure Sum Protocol. CoRR abs/0912.0956 (2009) - [i1]Durgesh Kumar Mishra, Samiksha Shukla:
Multi-Agent Model using Secure Multi-Party Computing in e-Governance. CoRR abs/0912.3984 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-14 19:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint