Follow
Richa Purohit
Richa Purohit
Sri Balaji University, Pune
Verified email at sbup.edu.in
Title
Cited by
Cited by
Year
An illustration to secured way of data mining using privacy preserving data mining
R Purohit, D Bhargava
Journal of Statistics and Management Systems 20 (4), 637-645, 2017
212017
A survey on recent cryptographic hash function designs
R Purohit, U Mishra, A Bansal
International Journal of Emerging Trends & Technology in Computer Science …, 2013
192013
Comparative Analysis of Few Cloud Service Providers Considering Their Distinctive Properties.
R Purohit
International Journal of Advanced Research in Computer Science 8 (5), 2017
112017
Design and analysis of a new hash algorithm with key integration
R Purohit, U Mishra, A Bansal
International Journal of Computer Applications 975, 8887, 2013
102013
Design and Implementation of Pothole Detection & Instance Detection Based on A Unified Approach For Globally Roads
M Pagale, S Mulik, R Purohit, A Thakare, S Jadhav
2023 1st International Conference on Innovations in High Speed Communication …, 2023
22023
Design and Implementation of Lane Detection using Hough Transformation
M Pagale, S Mulik, R Purohit, A Thakare, R Hanchate, S Jadhav
2023 2nd International Conference on Applied Artificial Intelligence and …, 2023
12023
Implementation of Double Encrypted MAC based on Diffie-Hellman Key Exchange for Improved integrity and Authentication
R Purohit, SV Mohurle, M Patil, D Bhargava
International Journal of Advanced Science and Research 3, 39-42, 2018
12018
Integrtation of Encryption and Hash Function for Improved Message Authenticity
R Purohit, Y Singh, U Mishra, A Bansal
International Journal of Engineering Research and Applications (IJERA) 2 …, 2012
12012
Insights of Deep Convolutional Neural Network for Traffic Sign Detection in Autonomous Vehicle
M Pagale, R Purohit, P Dhade, A Thakare, S Gudadhe, P Narkhede
2023 2nd International Conference on Applied Artificial Intelligence and …, 2023
2023
A Study on Cryptographic Hash Functions in Blockchain and Cryptocurrency
HB R.Purohit
Web of Science, UGC Care list-II Journal: Vidyabharati International …, 2021
2021
A review on privacy protection in the internet of things using machine learning-based solutions
M Pagale, R Purohit
International Journal of Information Privacy, Security and Integrity 5 (1 …, 2021
2021
Ring Signature: Presenting New Design with Keyed Hash Function
R Purohit
Proceedings of International Conference on Sustainable Computing in Science …, 2019
2019
Designing Cloud Supported Health Services Model for Rural Areas in Maharashtra.
RP V.N.Mahandule, P.Shrivastava
International Journal of Research and Analytical Reviews 6 (1), 43-47, 2019
2019
Implementation of Cloud Based Healthcare Services: Need and Challenges.
RP V.N.Mahandule, J.Sheetlani
International Journal of Technical Innovation in Modern Engineering …, 2018
2018
Richa Purohit Upendra Mishra
A Bansal
2013
An Illustrative Approach for Secure Key Based Authentication for Cloud Communication
R Purohit
Review Of ReseaRch
MV Mahandule, J Sheetlani, R Purohit
IMPLEMENTATION OF CLOUD BASED HEALTHCARE SERVICES: NEED AND CHALLENGES
MV Mahandule, J Sheetlani, R Purohit
Mechanism For Imposing E-Mail Header Security: Expectation And Solution
R Purohit
A DHT Oriented Peer To Peer Network with New Hash Function
A Saroliya, R Purohit, U Mishra, A Rana, A Bansal
The system can't perform the operation now. Try again later.
Articles 1–20