Li-Fi technology: data transmission through visible light A Sarkar, S Agarwal, A Nath International Journal of Advance Research in Computer Science and Management …, 2015 | 128 | 2015 |
Big data security issues and challenges R Toshniwal, KG Dastidar, A Nath International Journal of Innovative Research in Advanced Engineering (IJIRAE …, 2015 | 77 | 2015 |
Real-time communication application based on android using Google firebase N Chatterjee, S Chakraborty, A Decosta, A Nath Int. J. Adv. Res. Comput. Sci. Manag. Stud 6 (4), 2018 | 71 | 2018 |
Scope and challenges in light fidelity (LiFi) technology in wireless data communication S Chatterjee, S Agarwal, A Nath International Journal of Innovative Research in Advanced Engineering (IJIRAE …, 2015 | 71 | 2015 |
Advanced steganography algorithm using randomized intermediate QR host embedded with any encrypted secret message: ASA_QR algorithm S Dey, K Mondal, J Nath, A Nath International Journal of Modern Education and Computer Science 4 (6), 59, 2012 | 70 | 2012 |
Open and distance learning (ODL) education system-past, present and future–a systematic study of an alternative education system S Ghosh Journal of Global Research in Computer Science 3 (4), 53-57, 2012 | 70 | 2012 |
Symmetric Key Cryptography Using Random Key Generator. A Nath, S Ghosh, MA Mallick Security and Management, 234-242, 2010 | 70 | 2010 |
Sustainable approaches and good practices in green software engineering S Agarwal, A Nath, D Chowdhury International Journal of Research and Reviews in Computer Science 3 (1), 1425, 2012 | 56 | 2012 |
Green computing-a new horizon of energy efficiency and electronic waste minimization: A global perspective S Agarwal, A Nath 2011 International Conference on Communication Systems and Network …, 2011 | 54 | 2011 |
An Integrated Symmetric Key Cryptographic Method-Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm S Dey, J Nath, A Nath International Journal of Modern Education and Computer Science 4 (5), 1, 2012 | 53 | 2012 |
A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm D Chatterjee, J Nath, S Dasgupta, A Nath 2011 International Conference on Communication Systems and Network …, 2011 | 52 | 2011 |
Issues of privacy and security in the role of software in smart cities M Sen, A Dutt, S Agarwal, A Nath 2013 International Conference on Communication Systems and Network …, 2013 | 50 | 2013 |
Massive open online courses (MOOCs) in education—A case study in Indian context and vision to ubiquitous learning P Chatterjee, A Nath 2014 IEEE International Conference on MOOC, Innovation and Technology in …, 2014 | 49 | 2014 |
Advanced Steganography Algorithm using encrypted secret message J Nath, A Nath International journal of advanced computer science and applications 2 (3), 2011 | 49 | 2011 |
An advanced combined symmetric key cryptographic method using bit manipulation, bit reversal, modified caesar cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm S Dey, J Nath, A Nath International Journal of Computer Applications 46 (20), 46-53, 2012 | 45 | 2012 |
New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm N Khanna, J Nath, J James, S Chakraborty, A Chakrabarti, A Nath 2011 International Conference on Communication Systems and Network …, 2011 | 45 | 2011 |
Confidential encrypted data hiding and retrieval using qr authentication system S Dey, S Agarwal, A Nath 2013 International Conference on Communication Systems and Network …, 2013 | 43 | 2013 |
Impact of Mobile Phone/Smartphone: A pilot study on positive and negative effects A Nath, S Mukherjee International Journal 3 (5), 294-302, 2015 | 41 | 2015 |
Virtual desktop infrastructure in higher education institution: Energy efficiency as an application of green computing S Agrawal, R Biswas, A Nath 2014 Fourth International Conference on Communication Systems and Network …, 2014 | 41 | 2014 |
On the design of a classifier with linguistic variables as inputs AK Nath, TT Lee Fuzzy sets and systems 11 (1-3), 265-286, 1983 | 37 | 1983 |