default search action
Sunil Kumar 0004
Person information
- affiliation: University of Delhi, South Campus, Institute of Informatics and Communication, New Delhi, India
Other persons with the same name
- Sunil Kumar — disambiguation page
- Sunil Kumar 0001 — San Diego State University, Department of Electrical and Computer Engineering, CA, USA (and 3 more)
- Sunil Kumar 0002 — Indian Institute of Technology (BHU), Department of Mathematical Sciences, Varanasi, India (and 4 more)
- Sunil Kumar 0003 — Hankuk University of Foreign Studies, Department of Information and Communications Engineering, Seoul, South Korea
- Sunil Kumar 0005 — ABES Engineering College, Ghaziabad, India (and 1 more)
- Sunil Kumar 0006 — Indian Institute of Technology Madras, Chennai, India
- Sunil Kumar 0007 — Maharshi Dayanand University, Mechanical Engineering Department, Rohtak, India
- Sunil Kumar 0008 — Manipal University Jaipur, India (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Kamlesh Kumar Raghuvanshi, Subodh Kumar, Sushil Kumar, Sunil Kumar:
Image encryption algorithm based on DNA encoding and CNN. Expert Syst. Appl. 252: 124287 (2024) - 2023
- [j8]Kamlesh Kumar Raghuvanshi, Sunil Kumar, Subodh Kumar, Sushil Kumar:
Investigation of piecewise linear chaotic map as a diffusion model for image encryption. Multim. Tools Appl. 82(23): 36325-36342 (2023) - [j7]Mukesh Rawat, Anil Singh Bafila, Sunil Kumar, Manish Kumar, Amit Pundir, Sanjeev Singh:
A new encryption model for multimedia content using two dimensional Brownian motion and coupled map lattice. Multim. Tools Appl. 82(28): 43421-43453 (2023) - 2021
- [j6]Kamlesh Kumar Raghuvanshi, Subodh Kumar, Sushil Kumar, Sunil Kumar:
Development of new encryption system using Brownian motion based diffusion. Multim. Tools Appl. 80(14): 21011-21040 (2021) - 2020
- [j5]Kamlesh Kumar Raghuvanshi, Subodh Kumar, Sunil Kumar:
A data encryption model based on intertwining logistic map. J. Inf. Secur. Appl. 55: 102622 (2020)
2010 – 2019
- 2019
- [j4]Subodh Kumar, Rajendra Kumar, Sushil Kumar, Sunil Kumar:
Cryptographic construction using coupled map lattice as a diffusion model to enhanced security. J. Inf. Secur. Appl. 46: 70-83 (2019) - 2018
- [j3]Manish Kumar, Sunil Kumar, Mrinal Kanti Das, Rajat Budhiraja, Sanjeev Singh:
Securing images with a diffusion mechanism based on Fractional Brownian Motion. J. Inf. Secur. Appl. 40: 134-144 (2018) - [j2]Sunil Kumar, Manish Kumar, Rajat Budhiraja, Mrinal Kanti Das, Sanjeev Singh:
A cryptographic model for better information security. J. Inf. Secur. Appl. 43: 123-138 (2018) - [c5]Manish Kumar, Sunil Kumar, Rajat Budhiraja, Mrinal Kanti Das, Sanjeev Singh:
Performance evaluation of a new shuffling cipher model with most used chaotic dynamical systems. TENCON 2018: 167-171 - [c4]Sunil Kumar, Manish Kumar, Rajat Budhiraja, Mrinal Kanti Das, Sanjeev Singh:
Investigation of coupled map lattice as a diffusion model for enhanced image security. TENCON 2018: 172-175 - 2017
- [j1]Manish Kumar, Sunil Kumar, Rajat Budhiraja, Mrinal Kanti Das, Sanjeev Singh:
A cryptographic model based on logistic map and a 3-D matrix. J. Inf. Secur. Appl. 32: 47-58 (2017) - [c3]Manish Kumar, Sunil Kumar, Mrinal Kanti Das, Sanjeev Singh, Rajat Budhiraja:
Chaotic dynamical systems based image encryption model. ICTC 2017: 93-98 - [c2]Sunil Kumar, Manish Kumar, Mrinal Kanti Das, Sanjeev Singh, Rajat Budhiraja:
Improved cryptographic model for better information security. ICTC 2017: 406-410 - 2016
- [c1]Manish Kumar, Sunil Kumar, Rajat Budhiraja, Mrinal Kanti Das, Sanjeev Singh:
Lightweight Data Security Model for IoT Applications: A Dynamic Key Approach. iThings/GreenCom/CPSCom/SmartData 2016: 424-428
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint