Dr Om Pal
Cited by
Cited by
Key management for blockchain technology
O Pal, B Alam, V Thakur, S Singh
ICT express 7 (1), 76-80, 2021
Real-world model for bitcoin price prediction
RK Rathore, D Mishra, PS Mehra, O Pal, AS Hashim, A Shapi'i, T Ciano, ...
Information Processing & Management 59 (4), 102968, 2022
EETSP: Energy‐efficient two‐stage routing protocol for wireless sensor network‐assisted Internet of Things
AK Dwivedi, PS Mehra, O Pal, MN Doja, B Alam
International Journal of Communication Systems 34 (17), e4965, 2021
Cryptographic key management for SCADA system: An architectural framework
O Pal, S Saiwan, P Jain, Z Saquib, D Patel
2009 International conference on advances in computing, control, and …, 2009
FD-YOLOv5: a fuzzy image enhancement based robust object detection model for safety helmet detection
M Sadiq, S Masood, O Pal
International Journal of Fuzzy Systems 24 (5), 2600-2616, 2022
Cyber security risks and challenges in supply chain.
O Pal, B Alam
International Journal of Advanced Research in Computer Science 8 (5), 2017
A new blockchain and fog computing model for blood pressure medical sensor data storage
V Mani, MM Ghonge, NK Chaitanya, O Pal, M Sharma, S Mohan, ...
Computers and Electrical Engineering 102, 108202, 2022
Efficient and secure key management for conditional access systems
O Pal, B Alam
IEEE Transactions on Consumer Electronics 66 (1), 1-10, 2019
Public key cryptography based approach for securing SCADA communications
A Saxena, O Pal, Z Saquib
Computer Networks and Information Technologies: Second International …, 2011
Analysing the impact of COVID-19 pandemic on the psychological health of people using fuzzy MCDM methods
S Ahmad, S Masood, NZ Khan, IA Badruddin, A Ahmadian, ZA Khan, ...
Operations Research Perspectives 10, 100263, 2023
Diffie-Hellman key exchange protocol with entities authentication
O Pal, B Alam
International Journal Of Engineering And Computer Science 6 (4), 2017
Blockchain technology and it’s applications in e-governance services
O Pal, S Singh
International Journal of Recent Technology and Engineering (IJRTE) 8 (4 …, 2019
SCGKM: a secure and cost-effective group key management scheme for multicast communication in large dynamic groups
V Kumar, O Pal, V Thakur, K Kumar
International Journal of Information Technology 14 (2), 781-788, 2022
Dual secure robust watermarking scheme based on hybrid optimization algorithm for image security
S Alam, T Ahmad, MN Doja, O Pal
Personal and Ubiquitous Computing, 1-13, 2021
Efficient and secure conditional access system for pay-TV systems
O Pal, B Alam
Multimedia Tools and Applications 78, 18835-18853, 2019
How to report cyber crimes in Indian territory
PT Ompall, B Alam
Int J Sci Technol Manag 6 (04), 2394-1537, 2017
A homomorphic encryption scheme over integers based on Carmichael's theorem
PK Siddharth, O Pal, B Alam
2016 International Conference on Electrical, Electronics, Communication …, 2016
Token based key management scheme for scada communication
A Saxena, O Pal, S Saiwan, Z Saquib
Int. J. Distrib. Parallel Syst 2, 69-86, 2011
Key management for blockchain technology. ICT Express, 7 (1), 76-80
O Pal, B Alam, V Thakur, S Singh
Customized PKI for SCADA system
A Saxena, O Pal, Z Saquib, D Patel
Int. J. of Advanced Networking and Applications 1 (05), 282-289, 2010
The system can't perform the operation now. Try again later.
Articles 1–20