Skip navigation

Browsing by Author Misra M.

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 110  next >
Issue DateTitleAuthor(s)
2018A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful sharesSingh P.; Raman B.; Misra M.
2014A 2D graphical representation of protein sequence and their similarity analysis with probabilistic methodGupta M.K.; Niyogi R.; Misra M.
2007A dependency based bandwidth aware dynamic job grouping grid scheduler with deadline based network-ToSSingh V.S.; Misra M.
2008A feedback based secure concurrency control for MLS distributed databaseKaur N.; Singh R.; Misra M.; Sarje A.K.
2013A framework for alignment-free methods to perform similarity analysis of biological sequenceGupta M.K.; Niyogi R.; Misra M.
2005A memory efficient fast distributed real time commit protocolShanker U.; Misra M.; Sarje A.K.
2013A new adjacent pair 2D graphical representation of DNA sequencesGupta M.K.; Niyogi R.; Misra M.
2006A new cache replacement policy for location dependent data in mobile environmentKumar A.; Misra M.; Sarje A.K.
2018A new secure authentication scheme for web login using BLE smart devicesVarshney G.; Misra M.; Atrey P.; Dong J.; Zhou J.; Guo D.
2016A phish detector using lightweight search featuresVarshney G.; Misra M.; Atrey P.K.
2006A predicted region based cache replacement policy for location dependent data in mobile environmentKumar A.; Misra M.; Sarje A.K.
2017A reversible robust watermarking scheme based on two out of two visual cryptography approachSingh P.; Raman B.; Misra M.
2006A secure concurrency control for MLS/DDBSsKaur N.; Singh R.; Misra M.; Sarje A.K.
2017A secure image sharing scheme based on SVD and Fractional Fourier TransformSingh P.; Raman B.; Misra M.
2010A secure prioritized trust based multi-path routing protocol for ad hoc networksPoonam; Garg K.; Misra M.
2016A survey and classification of web phishing detection schemesVarshney G.; Misra M.; Atrey P.K.
2007A weighted cache replacement policy for location dependent data in mobile environmentsKumar A.; Misra M.; Sarje A.K.
2010A weighted checkpointing protocol for mobile distributed systemsAwasthi L.K.; Misra M.; Joshi R.C.
2006A zone co-operation approach for efficient caching in mobile ad hoc networksChand N.; Joshi R.C.; Misra M.
2013An alignment-free method to find similarity among protein sequences via the general form of Chou's pseudo amino acid compositionGupta M.K.; Niyogi R.; Misra M.