BibTeX records: Durgesh Kumar Mishra

download as .bib file

@inproceedings{DBLP:conf/ukci/ChandravanshiSM23,
  author       = {Kamlesh Chandravanshi and
                  Gaurav Soni and
                  Durgesh Kumar Mishra},
  editor       = {Nitin Naik and
                  Paul Jenkins and
                  Paul Grace and
                  Longzhi Yang and
                  Shaligram Prajapat},
  title        = {A Method for Load Balancing and Energy Optimization in Cloud Computing
                  Virtual Machine Scheduling},
  booktitle    = {Advances in Computational Intelligence Systems - Contributions Presented
                  at the 22nd {UK} Workshop on Computational Intelligence {(UKCI} 2023),
                  September 6-8, 2023, Birmingham, {UK}},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1453},
  pages        = {325--335},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47508-5\_26},
  doi          = {10.1007/978-3-031-47508-5\_26},
  timestamp    = {Tue, 13 Feb 2024 17:01:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ukci/ChandravanshiSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChandravanshiSM22,
  author       = {Kamlesh Chandravanshi and
                  Gaurav Soni and
                  Durgesh Kumar Mishra},
  title        = {Design and Analysis of an Energy-Efficient Load Balancing and Bandwidth
                  Aware Adaptive Multipath N-Channel Routing Approach in {MANET}},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {110003--110025},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3213051},
  doi          = {10.1109/ACCESS.2022.3213051},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ChandravanshiSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsmlai/MishraJM21,
  author       = {Ajai Mishra and
                  Dharm Singh Jat and
                  Durgesh Kumar Mishra},
  editor       = {Dharm Singh Jat and
                  Colin Stanley and
                  Jos{\'{e}} G. Quenum and
                  Nilanjan Dey and
                  Arpit Jain},
  title        = {Machine Intelligence for Predicting New Start-ups Success: {A} Survey},
  booktitle    = {{DSMLAI} '21: International Conference on Data Science, Machine Learning
                  and Artificial Intelligence, Windhoek Namibia, August 9 - 12, 2021},
  pages        = {99--105},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3484824.3484919},
  doi          = {10.1145/3484824.3484919},
  timestamp    = {Mon, 17 Jan 2022 10:52:59 +0100},
  biburl       = {https://dblp.org/rec/conf/dsmlai/MishraJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wocn/JadonBM19,
  author       = {Priyanshu Jadon and
                  Deepshikha Bhatia and
                  Durgesh Kumar Mishra},
  title        = {A BigData approach for sentiment analysis of twitter data using Naive
                  Bayes and {SVM} Algorithm},
  booktitle    = {Sixteenth International Conference on Wireless and Optical Communication
                  Networks, {WOCN} 2019, Bhopal, India, December 19-21, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WOCN45266.2019.8995109},
  doi          = {10.1109/WOCN45266.2019.8995109},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wocn/JadonBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wir/2018,
  editor       = {Durgesh Kumar Mishra and
                  Xin{-}She Yang and
                  Aynur Unal},
  title        = {Data Science and Big Data Analytics, {ACM-WIR} 2018, Women In Research
                  2018, Indore, India, 5-6 January 2018},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {16},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-10-7641-1},
  doi          = {10.1007/978-981-10-7641-1},
  isbn         = {978-981-10-7640-4},
  timestamp    = {Mon, 09 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wir/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wir/SheikhM18,
  author       = {Rashid Sheikh and
                  Durgesh Kumar Mishra},
  editor       = {Durgesh Kumar Mishra and
                  Xin{-}She Yang and
                  Aynur Unal},
  title        = {Secure Sum Computation Using Homomorphic Encryption},
  booktitle    = {Data Science and Big Data Analytics, {ACM-WIR} 2018, Women In Research
                  2018, Indore, India, 5-6 January 2018},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {16},
  pages        = {357--363},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-10-7641-1\_31},
  doi          = {10.1007/978-981-10-7641-1\_31},
  timestamp    = {Mon, 09 Mar 2020 14:47:06 +0100},
  biburl       = {https://dblp.org/rec/conf/wir/SheikhM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictcs2/SheikhM16,
  author       = {Rashid Sheikh and
                  Durgesh Kumar Mishra},
  title        = {Secure Sum Computation for Insecure Networks},
  booktitle    = {{ICTCS}},
  pages        = {102:1--102:7},
  year         = {2016},
  url          = {https://doi.org/10.1145/2905055.2905316},
  doi          = {10.1145/2905055.2905316},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ictcs2/SheikhM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wir/AhujaMJ16,
  author       = {Kamlesh Ahuja and
                  Durgesh Kumar Mishra and
                  Sarika Jain},
  editor       = {Durgesh Kumar Mishra and
                  Rashid Sheikh and
                  Sarika Jain},
  title        = {A Survey Paper on a Compact Data Structure Based Technique for Mining
                  Frequent Closed Item Set},
  booktitle    = {{WIR} '16: Women in Research 2016, Indore India, March, 2016},
  pages        = {139--141},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909067.2909093},
  doi          = {10.1145/2909067.2909093},
  timestamp    = {Wed, 31 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wir/AhujaMJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wir/2016,
  editor       = {Durgesh Kumar Mishra and
                  Rashid Sheikh and
                  Sarika Jain},
  title        = {{WIR} '16: Women in Research 2016, Indore India, March, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909067},
  doi          = {10.1145/2909067},
  isbn         = {978-1-4503-4278-0},
  timestamp    = {Mon, 09 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wir/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShuklaSM14,
  author       = {Samiksha Shukla and
                  G. Sadashivappa and
                  Durgesh Kumar Mishra},
  title        = {Simulation of Collision Resistant Secure Sum Protocol},
  journal      = {CoRR},
  volume       = {abs/1411.7756},
  year         = {2014},
  url          = {http://arxiv.org/abs/1411.7756},
  eprinttype    = {arXiv},
  eprint       = {1411.7756},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShuklaSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wocn/JoshiM12,
  author       = {Shubham Joshi and
                  Durgesh Kumar Mishra},
  title        = {A survey on threats in routing security in manet for trust management
                  using {SMC} protocols},
  booktitle    = {Ninth International Conference on Wireless and Optical Communications
                  Networks, {WOCN} 2012, Indore, India, September 20-22, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WOCN.2012.6335557},
  doi          = {10.1109/WOCN.2012.6335557},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wocn/JoshiM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SheikhMK11,
  author       = {Rashid Sheikh and
                  Durgesh Kumar Mishra and
                  Beerendra Kumar},
  title        = {Secure Multiparty Computation: From Millionaires Problem to Anonymizer},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {1},
  pages        = {25--33},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2010.544701},
  doi          = {10.1080/19393555.2010.544701},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/SheikhMK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cicsyn/DoohanMT11,
  author       = {Nitika Vats Doohan and
                  Durgesh Kumar Mishra and
                  Sanjeev Tokekar},
  editor       = {David Al{-}Dabass and
                  Suwarno and
                  Jasmy Yunus and
                  Ismail Saad and
                  Dayu Giriantari and
                  Ajith Abraham},
  title        = {Reliability Analysis for Wireless Sensor Networks Considering Environmental
                  Parameters Using {MATLAB}},
  booktitle    = {Third International Conference on Computational Intelligence, Communication
                  Systems and Networks, CICSyN 2011, Bali, Indonesia, 26-28 July, 2011},
  pages        = {99--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CICSyN.2011.32},
  doi          = {10.1109/CICSYN.2011.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cicsyn/DoohanMT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cicsyn/ChoudharyPNM11,
  author       = {Kavita Choudhary and
                  Umasanker Pandey and
                  Malay Kumar Nayak and
                  Durgesh Kumar Mishra},
  editor       = {David Al{-}Dabass and
                  Suwarno and
                  Jasmy Yunus and
                  Ismail Saad and
                  Dayu Giriantari and
                  Ajith Abraham},
  title        = {Electronic Data Interchange: {A} Review},
  booktitle    = {Third International Conference on Computational Intelligence, Communication
                  Systems and Networks, CICSyN 2011, Bali, Indonesia, 26-28 July, 2011},
  pages        = {323--327},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CICSyN.2011.74},
  doi          = {10.1109/CICSYN.2011.74},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cicsyn/ChoudharyPNM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MishraC10,
  author       = {Durgesh Kumar Mishra and
                  Manohar Chandwani},
  title        = {A Secured MultiParty Computational Protocol to Protect Cyber Space},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {4},
  pages        = {175--181},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393550903532553},
  doi          = {10.1080/19393550903532553},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/MishraC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wocn/LudhiyaniPJM10,
  author       = {Arpit Ludhiyani and
                  Rohit Pathak and
                  Satyadhar Joshi and
                  Durgesh Kumar Mishra},
  title        = {Strategic Game theory models and commercialization for Nano {RFID}
                  systems},
  booktitle    = {Proceedings of the 7th International Conference on Wireless and Optical
                  Communications Networks, {WOCN} 2010, Colombo, Sri Lanka, 6-8 September
                  2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WOCN.2010.5587329},
  doi          = {10.1109/WOCN.2010.5587329},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/wocn/LudhiyaniPJM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wocn/MishraPJL10,
  author       = {Durgesh Kumar Mishra and
                  Rohit Pathak and
                  Satyadhar Joshi and
                  Arpit Ludhiyani},
  title        = {Secure Multi-Party Computation for statistical computations using
                  virtual parties on a Token Ring Network},
  booktitle    = {Proceedings of the 7th International Conference on Wireless and Optical
                  Communications Networks, {WOCN} 2010, Colombo, Sri Lanka, 6-8 September
                  2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WOCN.2010.5587326},
  doi          = {10.1109/WOCN.2010.5587326},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wocn/MishraPJL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wocn/PathakJML10,
  author       = {Rohit Pathak and
                  Satyadhar Joshi and
                  Durgesh Kumar Mishra and
                  Arpit Ludhiyani},
  title        = {Tri-TTP based architecture for Secure Multi-Party Computations using
                  Virtual Parties},
  booktitle    = {Proceedings of the 7th International Conference on Wireless and Optical
                  Communications Networks, {WOCN} 2010, Colombo, Sri Lanka, 6-8 September
                  2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WOCN.2010.5587324},
  doi          = {10.1109/WOCN.2010.5587324},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wocn/PathakJML10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wocn/SheikhCM10,
  author       = {Rashid Sheikh and
                  Mahakal Singh Chande and
                  Durgesh Kumar Mishra},
  title        = {Security issues in {MANET:} {A} review},
  booktitle    = {Proceedings of the 7th International Conference on Wireless and Optical
                  Communications Networks, {WOCN} 2010, Colombo, Sri Lanka, 6-8 September
                  2010},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WOCN.2010.5587317},
  doi          = {10.1109/WOCN.2010.5587317},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wocn/SheikhCM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1002-2409,
  author       = {Rashid Sheikh and
                  Beerendra Kumar and
                  Durgesh Kumar Mishra},
  title        = {Changing Neighbors k Secure Sum Protocol for Secure Multi Party Computation},
  journal      = {CoRR},
  volume       = {abs/1002.2409},
  year         = {2010},
  url          = {http://arxiv.org/abs/1002.2409},
  eprinttype    = {arXiv},
  eprint       = {1002.2409},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1002-2409.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1002-4000,
  author       = {Rashid Sheikh and
                  Beerendra Kumar and
                  Durgesh Kumar Mishra},
  title        = {A Modified ck-Secure Sum Protocol for Multi-Party Computation},
  journal      = {CoRR},
  volume       = {abs/1002.4000},
  year         = {2010},
  url          = {http://arxiv.org/abs/1002.4000},
  eprinttype    = {arXiv},
  eprint       = {1002.4000},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1002-4000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1003-4071,
  author       = {Rashid Sheikh and
                  Beerendra Kumar and
                  Durgesh Kumar Mishra},
  title        = {A Distributed k-Secure Sum Protocol for Secure Multi-Party Computations},
  journal      = {CoRR},
  volume       = {abs/1003.4071},
  year         = {2010},
  url          = {http://arxiv.org/abs/1003.4071},
  eprinttype    = {arXiv},
  eprint       = {1003.4071},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1003-4071.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cicsyn/SatheeshMP09,
  author       = {Ajita Satheesh and
                  Durgesh Kumar Mishra and
                  Ravindra Patel},
  editor       = {David Al{-}Dabass and
                  Geetam S. Tomar and
                  Rajeev Tripathi and
                  Ajith Abraham},
  title        = {Classification Rule Mining for Object Oriented Databases: {A} Brief
                  Review},
  booktitle    = {First International Conference on Computational Intelligence, Communication
                  Systems and Networks, {CICSYN} 2009, Indore, India, 23-25 July, 2009},
  pages        = {259--263},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CICSYN.2009.60},
  doi          = {10.1109/CICSYN.2009.60},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cicsyn/SatheeshMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icetet/ShaikhBPPM09,
  author       = {Zulfa Shaikh and
                  Dinesh Bhati and
                  D. M. Puntambekar and
                  Pushpa Pathak and
                  Durgesh Kumar Mishra},
  title        = {Congestion Control during Data Privacy in Secure Multiparty Computation},
  booktitle    = {Proceedings of the Second International Conference on Emerging Trends
                  in Engineering {\&} Technology, {ICETET} 2009, Nagpur, Maharashtra,
                  India, 16-18 December 2009},
  pages        = {330--332},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICETET.2009.63},
  doi          = {10.1109/ICETET.2009.63},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icetet/ShaikhBPPM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icetet/SethiMSM09,
  author       = {Kamal K. Sethi and
                  Durgesh Kumar Mishra and
                  Gopal Solanki and
                  Bharat Mishra},
  title        = {Key Issues of Security and Integrity in Third Party Association Rule
                  Mining},
  booktitle    = {Proceedings of the Second International Conference on Emerging Trends
                  in Engineering {\&} Technology, {ICETET} 2009, Nagpur, Maharashtra,
                  India, 16-18 December 2009},
  pages        = {337--340},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICETET.2009.136},
  doi          = {10.1109/ICETET.2009.136},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icetet/SethiMSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icetet/GuptaTM09,
  author       = {Richa Gupta and
                  Sanjiv Tokekar and
                  Durgesh Kumar Mishra},
  title        = {A Paramount Pair of Cache Replacement Algorithms on {L1} and {L2}
                  Using Multiple Databases with Security},
  booktitle    = {Proceedings of the Second International Conference on Emerging Trends
                  in Engineering {\&} Technology, {ICETET} 2009, Nagpur, Maharashtra,
                  India, 16-18 December 2009},
  pages        = {346--351},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICETET.2009.16},
  doi          = {10.1109/ICETET.2009.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icetet/GuptaTM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0908-0994,
  author       = {Durgesh Kumar Mishra and
                  Neha Koria and
                  Nikhil Kapoor and
                  Ravish Bahety},
  title        = {A Secure Multi-Party Computation Protocol for Malicious Computation
                  Prevention for preserving privacy during Data Mining},
  journal      = {CoRR},
  volume       = {abs/0908.0994},
  year         = {2009},
  url          = {http://arxiv.org/abs/0908.0994},
  eprinttype    = {arXiv},
  eprint       = {0908.0994},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0908-0994.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0912-0956,
  author       = {Rashid Sheikh and
                  Beerendra Kumar and
                  Durgesh Kumar Mishra},
  title        = {Privacy Preserving k Secure Sum Protocol},
  journal      = {CoRR},
  volume       = {abs/0912.0956},
  year         = {2009},
  url          = {http://arxiv.org/abs/0912.0956},
  eprinttype    = {arXiv},
  eprint       = {0912.0956},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0912-0956.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0912-3984,
  author       = {Durgesh Kumar Mishra and
                  Samiksha Shukla},
  title        = {Multi-Agent Model using Secure Multi-Party Computing in e-Governance},
  journal      = {CoRR},
  volume       = {abs/0912.3984},
  year         = {2009},
  url          = {http://arxiv.org/abs/0912.3984},
  eprinttype    = {arXiv},
  eprint       = {0912.3984},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0912-3984.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics