• Publications
  • Influence
A Distributed k-Secure Sum Protocol for Secure Multi-Party Computations
TLDR
In this paper, we provide a novel protocol to com- pute the sum of individual data inputs with zero probability of data leakage when two neighbor parties collude to know the data of a middle party. Expand
  • 62
  • 3
  • PDF
Privacy Preserving k Secure Sum Protocol
TLDR
Secure Multiparty Computation (SMC) allows multiple parties to evaluate a common function of their individual data inputs but no party wants to disclose its private data. Expand
  • 44
  • 1
  • PDF
Changing Neighbors k Secure Sum Protocol for Secure Multi Party Computation
TLDR
In this paper we provide a protocol to compute the sum of individual data inputs with zero probability of data leakage. Expand
  • 25
  • 1
  • PDF
Secure Multiparty Computation: From Millionaires Problem to Anonymizer
TLDR
Secure Multiparty Computation (SMC), multiple parties perform joint computation over data inputs preserving the privacy of their individual inputs. Expand
  • 10
  • 1
A Modified ck-Secure Sum Protocol for Multi-Party Computation
TLDR
We propose a modified version of our ck-Secure Sum protocol with more security when a group of the computing parties conspire to know the data of some party. Expand
  • 11
  • PDF
Logistic regression for polymorphic malware detection using ANOVA F-test
TLDR
We developed a defense system which uses Logistic regression with ANOVA F-Test and snort IDS to thwart polymorphic malware. Expand
  • 2
Efficient Prediction of Close Value using Genetic algorithm based horizontal partition decision tree in Stock Market
Normal 0 The goal of fundamental analysis is to decide the value of a stock based on the previously mentioned factors and to act on the assumption that the actual stock price will eventually reflectExpand
  • 5
Intrusion Detection System Using Improved Ensemble Technique with DAG Approach
The Internet, computer networks and information are vital resources of current information trend and their protection has increased in importance in current existence. The intrusion detection systemExpand
Density-Subspace Clustering Based on Frequent Data Pattern
TLDR
This paper proposes a subspace clustering algorithm which follows the bottom-up strategy, evaluating each dimension separately and then using only those dimensions with high density in further steps. Expand
Dual Tree Complex Wavelet Transform for Image Security using Arnold Method
TLDR
We have proposed a novel hybrid Arnold transform scheme based on dual tree complex wavelet transform with block shuffling internally as well as externally. Expand
  • 1