Khan, Danish Ali
1456  results:
Search for persons X
?
3

Enhanced-Longest Common Subsequence based novel steganograp..:

Mandal, Sudakshina ; Khan, Danish Ali
Multimedia Tools and Applications.  82 (2022)  5 - p. 7779-7801 , 2022
 
?
4

Cloud-CoCoSo: Cloud Model-Based Combined Compromised Soluti..:

Mandal, Sudakshina ; Khan, Danish Ali
Arabian Journal for Science and Engineering.  47 (2022)  8 - p. 10307-10332 , 2022
 
?
6

Level by level image compression-encryption algorithm based..:

Singh, Ranjeet Kumar ; Kumar, Binod ; Shaw, Dilip Kumar.
Journal of King Saud University - Computer and Information Sciences.  33 (2021)  7 - p. 844-851 , 2021
 
?
7

A modified approach to data hiding in Microsoft Word docume..:

Mahato, Susmita ; Khan, Danish Ali ; Yadav, Dilip Kumar
Journal of King Saud University - Computer and Information Sciences.  32 (2020)  2 - p. 216-224 , 2020
 
?
8

A Study of Security Threats in Cloud: Passive Impact of COV..:

, In: 2020 International Conference on Smart Electronics and Communication (ICOSEC),
Mandal, Sudakshina ; Khan, Danish Ali - p. 837-842 , 2020
 
?
9

Personal characters to bits mapping using Dot Pattern Chara..:

Mahato, Susmita ; Yadav, Dilip Kumar ; Khan, Danish Ali
Journal of King Saud University - Computer and Information Sciences.  32 (2020)  2 - p. 197-207 , 2020
 
?
10

A Dynamic Programming Approach to Secure User Image Data in..:

, In: 2019 Fifth International Conference on Image Information Processing (ICIIP),
Mandal, Sudakshina ; Khan, Danish Ali - p. 91-96 , 2019
 
?
11

Comparison of Nikto and Uniscan for measuring URL vulnerabi..:

, In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT),
 
?
12

A novel information hiding scheme based on social networkin..:

Mahato, Susmita ; Yadav, Dilip Kumar ; Khan, Danish Ali
Journal of Information Security and Applications.  47 (2019)  - p. 275-283 , 2019
 
?
13

A minesweeper game-based steganography scheme:

Mahato, Susmita ; Yadav, Dilip Kumar ; Khan, Danish Ali
Journal of Information Security and Applications.  32 (2017)  - p. 1-14 , 2017
 
?
15

Theory and methodology for the JELS model in one-vendor, mu..:

Mandal, Sraboni ; Khan, Danish Ali
International Journal of Management Science and Engineering Management.  8 (2013)  3 - p. 210-218 , 2013
 
1-15