Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Durgesh Kumar Mishra
@inproceedings{DBLP:conf/ukci/ChandravanshiSM23, author = {Kamlesh Chandravanshi and Gaurav Soni and Durgesh Kumar Mishra}, editor = {Nitin Naik and Paul Jenkins and Paul Grace and Longzhi Yang and Shaligram Prajapat}, title = {A Method for Load Balancing and Energy Optimization in Cloud Computing Virtual Machine Scheduling}, booktitle = {Advances in Computational Intelligence Systems - Contributions Presented at the 22nd {UK} Workshop on Computational Intelligence {(UKCI} 2023), September 6-8, 2023, Birmingham, {UK}}, series = {Advances in Intelligent Systems and Computing}, volume = {1453}, pages = {325--335}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47508-5\_26}, doi = {10.1007/978-3-031-47508-5\_26}, timestamp = {Tue, 13 Feb 2024 17:01:25 +0100}, biburl = {https://dblp.org/rec/conf/ukci/ChandravanshiSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChandravanshiSM22, author = {Kamlesh Chandravanshi and Gaurav Soni and Durgesh Kumar Mishra}, title = {Design and Analysis of an Energy-Efficient Load Balancing and Bandwidth Aware Adaptive Multipath N-Channel Routing Approach in {MANET}}, journal = {{IEEE} Access}, volume = {10}, pages = {110003--110025}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3213051}, doi = {10.1109/ACCESS.2022.3213051}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ChandravanshiSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsmlai/MishraJM21, author = {Ajai Mishra and Dharm Singh Jat and Durgesh Kumar Mishra}, editor = {Dharm Singh Jat and Colin Stanley and Jos{\'{e}} G. Quenum and Nilanjan Dey and Arpit Jain}, title = {Machine Intelligence for Predicting New Start-ups Success: {A} Survey}, booktitle = {{DSMLAI} '21: International Conference on Data Science, Machine Learning and Artificial Intelligence, Windhoek Namibia, August 9 - 12, 2021}, pages = {99--105}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3484824.3484919}, doi = {10.1145/3484824.3484919}, timestamp = {Mon, 17 Jan 2022 10:52:59 +0100}, biburl = {https://dblp.org/rec/conf/dsmlai/MishraJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wocn/JadonBM19, author = {Priyanshu Jadon and Deepshikha Bhatia and Durgesh Kumar Mishra}, title = {A BigData approach for sentiment analysis of twitter data using Naive Bayes and {SVM} Algorithm}, booktitle = {Sixteenth International Conference on Wireless and Optical Communication Networks, {WOCN} 2019, Bhopal, India, December 19-21, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WOCN45266.2019.8995109}, doi = {10.1109/WOCN45266.2019.8995109}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wocn/JadonBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wir/2018, editor = {Durgesh Kumar Mishra and Xin{-}She Yang and Aynur Unal}, title = {Data Science and Big Data Analytics, {ACM-WIR} 2018, Women In Research 2018, Indore, India, 5-6 January 2018}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {16}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-10-7641-1}, doi = {10.1007/978-981-10-7641-1}, isbn = {978-981-10-7640-4}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/SheikhM18, author = {Rashid Sheikh and Durgesh Kumar Mishra}, editor = {Durgesh Kumar Mishra and Xin{-}She Yang and Aynur Unal}, title = {Secure Sum Computation Using Homomorphic Encryption}, booktitle = {Data Science and Big Data Analytics, {ACM-WIR} 2018, Women In Research 2018, Indore, India, 5-6 January 2018}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {16}, pages = {357--363}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-10-7641-1\_31}, doi = {10.1007/978-981-10-7641-1\_31}, timestamp = {Mon, 09 Mar 2020 14:47:06 +0100}, biburl = {https://dblp.org/rec/conf/wir/SheikhM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictcs2/SheikhM16, author = {Rashid Sheikh and Durgesh Kumar Mishra}, title = {Secure Sum Computation for Insecure Networks}, booktitle = {{ICTCS}}, pages = {102:1--102:7}, year = {2016}, url = {https://doi.org/10.1145/2905055.2905316}, doi = {10.1145/2905055.2905316}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ictcs2/SheikhM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/AhujaMJ16, author = {Kamlesh Ahuja and Durgesh Kumar Mishra and Sarika Jain}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {A Survey Paper on a Compact Data Structure Based Technique for Mining Frequent Closed Item Set}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {139--141}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909093}, doi = {10.1145/2909067.2909093}, timestamp = {Wed, 31 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wir/AhujaMJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wir/2016, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067}, doi = {10.1145/2909067}, isbn = {978-1-4503-4278-0}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShuklaSM14, author = {Samiksha Shukla and G. Sadashivappa and Durgesh Kumar Mishra}, title = {Simulation of Collision Resistant Secure Sum Protocol}, journal = {CoRR}, volume = {abs/1411.7756}, year = {2014}, url = {http://arxiv.org/abs/1411.7756}, eprinttype = {arXiv}, eprint = {1411.7756}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShuklaSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wocn/JoshiM12, author = {Shubham Joshi and Durgesh Kumar Mishra}, title = {A survey on threats in routing security in manet for trust management using {SMC} protocols}, booktitle = {Ninth International Conference on Wireless and Optical Communications Networks, {WOCN} 2012, Indore, India, September 20-22, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/WOCN.2012.6335557}, doi = {10.1109/WOCN.2012.6335557}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wocn/JoshiM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SheikhMK11, author = {Rashid Sheikh and Durgesh Kumar Mishra and Beerendra Kumar}, title = {Secure Multiparty Computation: From Millionaires Problem to Anonymizer}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {1}, pages = {25--33}, year = {2011}, url = {https://doi.org/10.1080/19393555.2010.544701}, doi = {10.1080/19393555.2010.544701}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/SheikhMK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cicsyn/DoohanMT11, author = {Nitika Vats Doohan and Durgesh Kumar Mishra and Sanjeev Tokekar}, editor = {David Al{-}Dabass and Suwarno and Jasmy Yunus and Ismail Saad and Dayu Giriantari and Ajith Abraham}, title = {Reliability Analysis for Wireless Sensor Networks Considering Environmental Parameters Using {MATLAB}}, booktitle = {Third International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2011, Bali, Indonesia, 26-28 July, 2011}, pages = {99--102}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CICSyN.2011.32}, doi = {10.1109/CICSYN.2011.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cicsyn/DoohanMT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cicsyn/ChoudharyPNM11, author = {Kavita Choudhary and Umasanker Pandey and Malay Kumar Nayak and Durgesh Kumar Mishra}, editor = {David Al{-}Dabass and Suwarno and Jasmy Yunus and Ismail Saad and Dayu Giriantari and Ajith Abraham}, title = {Electronic Data Interchange: {A} Review}, booktitle = {Third International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2011, Bali, Indonesia, 26-28 July, 2011}, pages = {323--327}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CICSyN.2011.74}, doi = {10.1109/CICSYN.2011.74}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cicsyn/ChoudharyPNM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MishraC10, author = {Durgesh Kumar Mishra and Manohar Chandwani}, title = {A Secured MultiParty Computational Protocol to Protect Cyber Space}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {4}, pages = {175--181}, year = {2010}, url = {https://doi.org/10.1080/19393550903532553}, doi = {10.1080/19393550903532553}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/MishraC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wocn/LudhiyaniPJM10, author = {Arpit Ludhiyani and Rohit Pathak and Satyadhar Joshi and Durgesh Kumar Mishra}, title = {Strategic Game theory models and commercialization for Nano {RFID} systems}, booktitle = {Proceedings of the 7th International Conference on Wireless and Optical Communications Networks, {WOCN} 2010, Colombo, Sri Lanka, 6-8 September 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WOCN.2010.5587329}, doi = {10.1109/WOCN.2010.5587329}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/wocn/LudhiyaniPJM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wocn/MishraPJL10, author = {Durgesh Kumar Mishra and Rohit Pathak and Satyadhar Joshi and Arpit Ludhiyani}, title = {Secure Multi-Party Computation for statistical computations using virtual parties on a Token Ring Network}, booktitle = {Proceedings of the 7th International Conference on Wireless and Optical Communications Networks, {WOCN} 2010, Colombo, Sri Lanka, 6-8 September 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WOCN.2010.5587326}, doi = {10.1109/WOCN.2010.5587326}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wocn/MishraPJL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wocn/PathakJML10, author = {Rohit Pathak and Satyadhar Joshi and Durgesh Kumar Mishra and Arpit Ludhiyani}, title = {Tri-TTP based architecture for Secure Multi-Party Computations using Virtual Parties}, booktitle = {Proceedings of the 7th International Conference on Wireless and Optical Communications Networks, {WOCN} 2010, Colombo, Sri Lanka, 6-8 September 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WOCN.2010.5587324}, doi = {10.1109/WOCN.2010.5587324}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wocn/PathakJML10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wocn/SheikhCM10, author = {Rashid Sheikh and Mahakal Singh Chande and Durgesh Kumar Mishra}, title = {Security issues in {MANET:} {A} review}, booktitle = {Proceedings of the 7th International Conference on Wireless and Optical Communications Networks, {WOCN} 2010, Colombo, Sri Lanka, 6-8 September 2010}, pages = {1--4}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WOCN.2010.5587317}, doi = {10.1109/WOCN.2010.5587317}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wocn/SheikhCM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1002-2409, author = {Rashid Sheikh and Beerendra Kumar and Durgesh Kumar Mishra}, title = {Changing Neighbors k Secure Sum Protocol for Secure Multi Party Computation}, journal = {CoRR}, volume = {abs/1002.2409}, year = {2010}, url = {http://arxiv.org/abs/1002.2409}, eprinttype = {arXiv}, eprint = {1002.2409}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1002-2409.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1002-4000, author = {Rashid Sheikh and Beerendra Kumar and Durgesh Kumar Mishra}, title = {A Modified ck-Secure Sum Protocol for Multi-Party Computation}, journal = {CoRR}, volume = {abs/1002.4000}, year = {2010}, url = {http://arxiv.org/abs/1002.4000}, eprinttype = {arXiv}, eprint = {1002.4000}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1002-4000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1003-4071, author = {Rashid Sheikh and Beerendra Kumar and Durgesh Kumar Mishra}, title = {A Distributed k-Secure Sum Protocol for Secure Multi-Party Computations}, journal = {CoRR}, volume = {abs/1003.4071}, year = {2010}, url = {http://arxiv.org/abs/1003.4071}, eprinttype = {arXiv}, eprint = {1003.4071}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1003-4071.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cicsyn/SatheeshMP09, author = {Ajita Satheesh and Durgesh Kumar Mishra and Ravindra Patel}, editor = {David Al{-}Dabass and Geetam S. Tomar and Rajeev Tripathi and Ajith Abraham}, title = {Classification Rule Mining for Object Oriented Databases: {A} Brief Review}, booktitle = {First International Conference on Computational Intelligence, Communication Systems and Networks, {CICSYN} 2009, Indore, India, 23-25 July, 2009}, pages = {259--263}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CICSYN.2009.60}, doi = {10.1109/CICSYN.2009.60}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cicsyn/SatheeshMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icetet/ShaikhBPPM09, author = {Zulfa Shaikh and Dinesh Bhati and D. M. Puntambekar and Pushpa Pathak and Durgesh Kumar Mishra}, title = {Congestion Control during Data Privacy in Secure Multiparty Computation}, booktitle = {Proceedings of the Second International Conference on Emerging Trends in Engineering {\&} Technology, {ICETET} 2009, Nagpur, Maharashtra, India, 16-18 December 2009}, pages = {330--332}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICETET.2009.63}, doi = {10.1109/ICETET.2009.63}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icetet/ShaikhBPPM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icetet/SethiMSM09, author = {Kamal K. Sethi and Durgesh Kumar Mishra and Gopal Solanki and Bharat Mishra}, title = {Key Issues of Security and Integrity in Third Party Association Rule Mining}, booktitle = {Proceedings of the Second International Conference on Emerging Trends in Engineering {\&} Technology, {ICETET} 2009, Nagpur, Maharashtra, India, 16-18 December 2009}, pages = {337--340}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICETET.2009.136}, doi = {10.1109/ICETET.2009.136}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icetet/SethiMSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icetet/GuptaTM09, author = {Richa Gupta and Sanjiv Tokekar and Durgesh Kumar Mishra}, title = {A Paramount Pair of Cache Replacement Algorithms on {L1} and {L2} Using Multiple Databases with Security}, booktitle = {Proceedings of the Second International Conference on Emerging Trends in Engineering {\&} Technology, {ICETET} 2009, Nagpur, Maharashtra, India, 16-18 December 2009}, pages = {346--351}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICETET.2009.16}, doi = {10.1109/ICETET.2009.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icetet/GuptaTM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0908-0994, author = {Durgesh Kumar Mishra and Neha Koria and Nikhil Kapoor and Ravish Bahety}, title = {A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining}, journal = {CoRR}, volume = {abs/0908.0994}, year = {2009}, url = {http://arxiv.org/abs/0908.0994}, eprinttype = {arXiv}, eprint = {0908.0994}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0908-0994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0912-0956, author = {Rashid Sheikh and Beerendra Kumar and Durgesh Kumar Mishra}, title = {Privacy Preserving k Secure Sum Protocol}, journal = {CoRR}, volume = {abs/0912.0956}, year = {2009}, url = {http://arxiv.org/abs/0912.0956}, eprinttype = {arXiv}, eprint = {0912.0956}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0912-0956.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0912-3984, author = {Durgesh Kumar Mishra and Samiksha Shukla}, title = {Multi-Agent Model using Secure Multi-Party Computing in e-Governance}, journal = {CoRR}, volume = {abs/0912.3984}, year = {2009}, url = {http://arxiv.org/abs/0912.3984}, eprinttype = {arXiv}, eprint = {0912.3984}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0912-3984.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.