default search action
Poonam Jindal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Sumit Singh Dhanda, Brahmjit Singh, Chia-Chen Lin, Poonam Jindal, Deepak Panwar, Tarun Kumar Sharma, Saurabh Agarwal, Wooguil Pak:
A Fast and Efficient 191-bit Elliptic Curve Cryptographic Processor Using a Hybrid Karatsuba Multiplier for IoT Applications. IEEE Access 12: 144304-144315 (2024) - [j14]Sumit Singh Dhanda, Brahmjit Singh, Poonam Jindal, Tarun Kumar Sharma, Deepak Panwar:
6G-enabled internet of medical things. Expert Syst. J. Knowl. Eng. 41(1) (2024) - [j13]Sonika Pahuja, Poonam Jindal:
Joint metaheuristics-based optimisation in wireless cooperative network. Int. J. Wirel. Mob. Comput. 26(3): 291-301 (2024) - [j12]Anil Kumar Kamboj, Poonam Jindal, Pankaj Verma:
Multi-agent Q-learning algorithm-based relay and jammer selection for physical layer security improvement. Int. J. Wirel. Mob. Comput. 27(4): 356-368 (2024) - [j11]Anil Kumar Kamboj, Poonam Jindal, Pankaj Verma:
Reinforcement learning-based secure joint relay and jammer selection in dual-hop wireless networks. J. Supercomput. 80(2): 2660-2680 (2024) - 2022
- [c4]Pankaj Verma, Amit Kumar, Poonam Jindal:
Machine Learning Approach for SPR based Photonic Crystal Fiber Sensor for Breast Cancer Cells Detection. RTSI 2022: 7-12 - 2021
- [j10]Akhilesh Yadav, Poonam Jindal, Devaraju Basappa:
Design and Implementation of RS(450, 406) Decoder: Forward Error Correction by Reed Solomon Decoding. Int. J. Embed. Real Time Commun. Syst. 12(1): 19-43 (2021) - [j9]Anil Kumar Kamboj, Poonam Jindal, Pankaj Verma:
Machine learning-based physical layer security: techniques, open challenges, and applications. Wirel. Networks 27(8): 5351-5383 (2021) - [j8]Anil Kumar Kamboj, Poonam Jindal, Pankaj Verma:
Intelligent Physical Layer Secure Relay Selection for Wireless Cooperative Networks with Multiple Eavesdroppers. Wirel. Pers. Commun. 120(3): 2449-2472 (2021) - [c3]K. Gopikrishna, Poonam Jindal:
Test Coverage Analysis of DFT with EDT and without EDT Architecture. ICCCNT 2021: 1-4 - 2020
- [j7]Shweta Pal, Poonam Jindal:
Secrecy Performance Analysis of Hybrid AF-DF Relaying Under Multi Hop Environment. Wirel. Pers. Commun. 111(3): 1741-1760 (2020) - [j6]Sumit Singh Dhanda, Brahmjit Singh, Poonam Jindal:
Lightweight Cryptography: A Solution to Secure IoT. Wirel. Pers. Commun. 112(3): 1947-1980 (2020)
2010 – 2019
- 2019
- [j5]Sonika Pahuja, Poonam Jindal:
Cooperative Communication in Physical Layer Security: Technologies and Challenges. Wirel. Pers. Commun. 108(2): 811-837 (2019) - 2017
- [j4]Poonam Jindal, Brahmjit Singh:
Quantitative analysis of the security performance in wireless LANs. J. King Saud Univ. Comput. Inf. Sci. 29(3): 246-268 (2017) - [j3]Poonam Jindal, Brahmjit Singh:
Security-Performance Tradeoffs in a Class of Wireless Network Scenarios. J. Netw. Syst. Manag. 25(1): 83-121 (2017) - [j2]Poonam Jindal, Brahmjit Singh:
Optimization of the Security-Performance Tradeoff in RC4 Encryption Algorithm. Wirel. Pers. Commun. 92(3): 1221-1250 (2017) - [c2]Poonam Jindal, Rupali Sinha:
Energy Efficiency and Secure Communication with Power Splitting Energy Harvesting Technique for Single Relay Network. ICCA 2017: 215-219 - [c1]Poonam Jindal, Rupali Sinha:
Physical Layer Security with Energy Harvesting in Single Hop Wireless Relaying System. ICISA 2017: 249-256 - 2015
- [j1]Poonam Jindal, Brahmjit Singh:
Experimental Study to Analyze the Security Performance in Wireless LANs. Wirel. Pers. Commun. 83(3): 2085-2131 (2015) - 2012
- [i1]Poonam Jindal, Brahmjit Singh:
Study And Performance Evaluation Of Security-Throughput Tradeoff With Link Adaptive Encryption Scheme. CoRR abs/1211.5080 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint