default search action
Sunil Karforma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Tanmoy Halder, Debasish Chakraborty, Ramen Pal, Sunita Sarkar, Somnath Mukhopadhyay, Nishtha Roy, Sunil Karforma:
A hybrid approach for water body identification from satellite images using NDWI mapping and histogram of gradients. Innov. Syst. Softw. Eng. 20(2): 111-120 (2024) - [j17]Joydeep Dey, Anirban Bhowmik, Sunil Karforma:
Telecardiology in "New Normal" COVID-19: Efficacy of Neuro-Metaheuristic Session Key (NMSK) and Encryption Through Bipartite New State-of-Art Sharing. Wirel. Pers. Commun. 138(3): 1737-1772 (2024) - 2023
- [j16]Joydeep Dey, Arindam Sarkar, Sunil Karforma, Bappaditya Chowdhury:
Metaheuristic secured transmission in Telecare Medical Information System (TMIS) in the face of post-COVID-19. J. Ambient Intell. Humaniz. Comput. 14(6): 6623-6644 (2023) - [j15]Anirban Bhowmik, Sunil Karforma:
Isomorphic encryption and coupled ANN with Mealy machine: a cutting edge data security model for cloud computing environment. Knowl. Inf. Syst. 65(1): 133-162 (2023) - [j14]Dulal Kumbhakar, Kanchan Sanyal, Sunil Karforma:
An optimal and efficient data security technique through crypto-stegano for E-commerce. Multim. Tools Appl. 82(14): 21005-21018 (2023) - [j13]Subhajit Adhikari, Sunil Karforma:
Medical Image Encryption Method Using Cubic-Sin-Logistic-Tent Chaotic Pseudo-Random Number Sequence-Based Substitution. SN Comput. Sci. 4(4): 338 (2023) - [j12]Joydeep Dey, Salim Ahmad, Sunil Karforma:
Establishment of Neural Series Transmission Keys (NSTKs) and Security in the Field of COVID-19 Telepediatric Oral Health. Wirel. Pers. Commun. 129(4): 2455-2480 (2023) - [j11]Subhajit Adhikari, Sunil Karforma:
An Efficient Image Encryption Method Using Henon-Logistic-Tent Chaotic Pseudo Random Number Sequence. Wirel. Pers. Commun. 129(4): 2843-2859 (2023) - 2022
- [j10]Anirban Bhowmik, Sunil Karforma:
Linear feedback shift register and integer theory: a state-of-art approach in security issues over e-commerce. Electron. Commer. Res. 22(4): 1-21 (2022) - [j9]Subhajit Adhikari, Sunil Karforma:
A novel image encryption method for e-governance application using elliptic curve pseudo random number and chaotic random number sequence. Multim. Tools Appl. 81(1): 759-784 (2022) - [j8]Joydeep Dey, Anirban Bhowmik, Sunil Karforma:
Neural perceptron & strict lossless secret sharing oriented cryptographic science: fostering patients' security in the "new normal" COVID-19 E-Health. Multim. Tools Appl. 81(13): 17747-17778 (2022) - [j7]Joydeep Dey, Anirban Bhowmik, Arindam Sarkar, Sunil Karforma, Bappaditya Chowdhury:
Cryptographic Engineering on COVID-19 Telemedicine: An Intelligent Transmission Through Recurrent Relation Based Session Key. Wirel. Pers. Commun. 122(4): 3167-3204 (2022) - [j6]Anirban Bhowmik, Sunil Karforma:
An Approach of Secret Sharing Technique Based on Convolution Neural Network and DNA Sequence for Data Security in Wireless Communication. Wirel. Pers. Commun. 124(4): 3413-3444 (2022) - 2021
- [j5]Joydeep Dey, Arindam Sarkar, Sunil Karforma:
ICT-Guided Glycemic Information Sharing Through Artificial Neural Telecare Network. SN Comput. Sci. 2(6): 426 (2021) - [j4]Joydeep Dey, Arindam Sarkar, Bappaditya Chowdhury, Sunil Karforma:
Episode of COVID-19 Telepsychiatry Session Key Origination Upon Swarm-Based Metaheuristic and Neural Perceptron Blend. SN Comput. Sci. 2(6): 445 (2021) - [j3]Arindam Sarkar, Joydeep Dey, Sunil Karforma:
Musically Modified Substitution-Box for Clinical Signals Ciphering in Wireless Telecare Medical Communicating Systems. Wirel. Pers. Commun. 117(2): 727-745 (2021)
2010 – 2019
- 2019
- [j2]Tanmoy Halder, Sunil Karforma, Rupali Mandal:
A Block-based Adaptive Data Hiding Approach using Pixel value difference and LSB Substitution to Secure E-Governance Documents. J. Inf. Process. Syst. 15(2): 261-270 (2019) - [p1]Soham Bandyopadhyay, Sunil Karforma:
Securing Packet Transmission Through Trusted Shortest Network Path Using Fuzzy Forecasting for Mobility of MANET Nodes. Security, Privacy and Trust in the IoT Environment 2019: 255-288 - 2015
- [i5]Akash Nag, Sunil Karforma:
DSA Security Enhancement through Efficient Nonce Generation. CoRR abs/1508.06370 (2015) - [i4]Akash Nag, Sunil Karforma:
A Space-Efficient Approach towards Distantly Homologous Protein Similarity Searches. CoRR abs/1508.06561 (2015) - 2012
- [i3]Arindam Sarkar, Sunil Karforma, J. K. Mandal:
Object Oriented Modelling of Idea using GA based efficient key generation for e-governance security (OOMIG). CoRR abs/1204.1797 (2012) - [i2]Nikhilesh Barik, Sunil Karforma:
Risks and remedies in e-learning system. CoRR abs/1205.2711 (2012) - [i1]Nikhilesh Barik, Sunil Karforma, J. K. Mondal, Arpita Ghosh:
Towards Design and Implementation of Space Efficient and Secured Transmission scheme on EGovernance data. CoRR abs/1212.3404 (2012)
2000 – 2009
- 2008
- [j1]Sanjay Banerjee, Sunil Karforma:
A prototype design for DRM based credit card transaction in E-commerce. Ubiquity 2008(May): 2:1 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint