COVID-19 Outbreak: An Epidemic Analysis using Time Series Prediction Model R Kumar, A Jain, AK Tripathi, S Tyagi 2021 11th International Conference on Cloud Computing, Data Science …, 2021 | 61 | 2021 |
Security Attacks, Requirements and Authentication Schemes in VANET AK Goyal, AK Tripathi, G Agarwal 2019 International Conference on Issues and Challenges in Intelligent …, 2019 | 30 | 2019 |
Assessment and Attainment of Program Educational Objectives for Post Graduate Courses [J] A Rajak, AK Shrivastava, S Bhardwaj, AK Tripathi International Journal of Modern Education & Computer Science 2, 26-32, 2019 | 29 | 2019 |
Comparison of MANET routing protocols A Mishra, S Singh, AK Tripathi Int. J. Comput. Sci. Mob. Comput 8, 67-74, 2019 | 27 | 2019 |
Network architectures, challenges, security attacks, research domains and research methodologies in VANET: a survey AK Goyal, G Agarwal, AK Tripathi International Journal of Computer Network and Information Security 11 (10 …, 2019 | 25 | 2019 |
Smart Contract enabled Online Examination System Based in Blockchain Network A Jain, AK Tripathi, N Chandra, P Chinnasamy 2021 International Conference on Computer Communication and Informatics …, 2021 | 23 | 2021 |
A Decentralized Way to Store and Authenticate Educational Documents on Private Blockchain AK Shrivastava, C Vashistth, A Rajak, AK Tripathi 2019 International Conference on Issues and Challenges in Intelligent …, 2019 | 22 | 2019 |
An Approach to Evaluate Program Outcomes and Program Educational Objectives through Direct and Indirect Assessment Tools A Rajak, A Shrivastava, A Tripathi International Journal of Emerging Technologies in Learning (iJET) 14 (23), 85-97, 2019 | 17 | 2019 |
Comparative Analysis of Packet Loss in Extended Wired LAN Environment S Singh, P Mudgal, P Chaudhary, AK Tripathi International Journal of Computer Applications 117 (2), 2015 | 13 | 2015 |
Role of 5G Networks: Issues, Challenges and Applications TA Kumar, R Akash, SA Kumar International Journal of Engineering and Advanced Technology (IJEAT) 8 (6 …, 2019 | 11* | 2019 |
Systematic study of VANET: Applications, challenges, threats, attacks, schemes and issues in research AK Goyal, G Agarwal, AK Tripathi, G Sharma Green Computing in Network Security, 33-52, 2022 | 10 | 2022 |
Impact of wireless link delay on handover latency in Mobile IPv6 environment AK Tripathi, R Radhakrishanan, JS Lather 2014 International Conference on Issues and Challenges in Intelligent …, 2014 | 10 | 2014 |
An approach towards time synchronization based secure protocol for wireless sensor network AK Tripathi, A Agarwal Networked Digital Technologies: Second International Conference, NDT 2010 …, 2010 | 10 | 2010 |
Mechanizing wireless LAN (WLAN) using compression techniques S Singh, AK Ahlawat, AK Tripathi Free Journal International Journal of Engineering, Applied Science and …, 2016 | 8 | 2016 |
Ensuring reliability in cloud computing and comparison on IPv6 encouraged with protocols AK Tripathi, S Singh Proceedings of International Conference on Science, Technology, Humanities …, 2016 | 7 | 2016 |
Analyzing for performance factors in cloud computing S Singh, AK Tripathi International Conference on Sustainable Computing Techniques in Engineering …, 2016 | 7 | 2016 |
Performance Analysis for Channel Utilization in Wireless LAN S Singh, N Chandra, AK Tripathi International Journal of Computer Applications 122 (20), 2015 | 7 | 2015 |
Security attacks and their countermeasures along with node replication attack for time synchronization in wireless sensor network S Umrao, A Kumar, P Umrao International Conference on Advanced Nanomaterials & Emerging Engineering …, 2013 | 7 | 2013 |
A Qualitative Analysis of Secured Handover Management Schemes for Mobile IPv6 Enabled Networks AK Tripathi, SK Tripathi 2018 3rd International Innovative Applications of Computational Intelligence …, 2018 | 6 | 2018 |
Secure and Optimized Authentication Scheme in Proxy Mobile IPv6 (SOAS-PMIPv6) to reduce Handover Latency AK Tripathi, JS Lather, R Radhakrishnan International Journal of Computer Network and Information Security 10 (10), 1, 2017 | 6 | 2017 |