A Review on Secure Data Deduplication: Cloud Storage Security Issue P Prajapati, P Shah Journal of King Saud University-Computer and Information Sciences 34 (7 …, 2022 | 80 | 2022 |
A Review of Various Challenges in Cybersecurity using Artificial Intelligence H Chaudhary, A Detroja, P Prajapati, P Shah 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS …, 2020 | 16 | 2020 |
Efficient cross user Data Deduplication in Remote Data Storage P Prajapati, P Shah International Conference for Convergence for Technology-2014, 1-5, 2014 | 15 | 2014 |
Efficient Cross User Client Side Data Deduplication in Hadoop P Prajapati, P Shah, A Ganatra, S Patel 2nd International Conference on Bioinformatics and Computer Engineering …, 2016 | 13 | 2016 |
Provable Data Possession using Additive Homomorphic Encryption P Shah, P Prajapati Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022 | 11 | 2022 |
Provable Data Possession Using Identity Based Encryption S Kadvani, A Patel, M Tilala, P Prajapati, P Shah 3rd International Conference on ICT for Intelligent Systems (ICTIS 2018 …, 2018 | 11 | 2018 |
A Review on Recent Intrusion Detection Systems and Intrusion Prevention Systems in IoT P Prajapati, B Bhatt, G Zalavadiya, M Ajwalia, P Shah 2021 11th International Conference on Cloud Computing, Data Science …, 2021 | 10 | 2021 |
A Review of Recent Detection Methods For HTTP DDoS Attacks P Prajapati, N Patel, P Shah International Journal of Scientific and Technology Research 8 (12), 1693-1696, 2019 | 9 | 2019 |
A Review of Recent Blockchain Applications P Prajapati, K Dave, P Shah International Journal of Scientific and Technology Research 9 (1), 897-903, 2020 | 8 | 2020 |
A Review of Recent Trends on DNA Based Cryptography G Bhoi, R Bhavsar, P Prajapati, P Shah 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS …, 2020 | 2 | 2020 |
Casper: Modification of Bitcoin using Proof of Stake N Sheth, P Prajapati, A Shaikh, P Shah 3rd International Conference on ICT for Intelligent Systems (ICTIS 2018 …, 2018 | 2 | 2018 |
A Review on Different Techniques used to detect the Malicious Applications for Securing the Android Operating System P Prajapati, D Bhagat, P Shah International Journal of Scientific and Technology Research 9 (2), 5255-5258, 2020 | 1 | 2020 |
Identity-Based Encryption (IBE) based Improved Data Possession Techniques P Shah, P Prajapati ICT Systems and Sustainability, 8th International Conference on ICT …, 2023 | | 2023 |
Privacy Challenges and Solutions in Implementing Searchable Encryption for Cloud Storage A Patel, P Prajapati, P Shah, V Sangani, M Ajwalia, T Upadhyaya ICT with Intelligent Applications, 7th International Conference on …, 2023 | | 2023 |
Code Buddy: A Machine Learning-Based Automatic Source Code Quality Reviewing System N Patel, A Mehta, P Prajapati, J Biskitwala Congress on Intelligent Systems (CIS 2020) 1334, 453-462, 2021 | | 2021 |