default search action
Garima Verma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Ashutosh Kumar, Garima Verma:
Securing cloud access with enhanced attribute-based cryptography. Computing 106(12): 4193-4207 (2024) - [j22]Garima Verma:
Blockchain-based privacy preservation framework for healthcare data in cloud environment. J. Exp. Theor. Artif. Intell. 36(1): 147-160 (2024) - [j21]Garima Verma, Soumen Kanrar:
Secure document sharing model based on blockchain technology and attribute-based encryption. Multim. Tools Appl. 83(6): 16377-16394 (2024) - [j20]Ankit Maithani, Garima Verma:
Hybrid model with improved score level fusion for heart disease classification. Multim. Tools Appl. 83(18): 54951-54987 (2024) - [j19]Garima Verma, Soumen Kanrar:
Secure Keyword Search over Encrypted Cloud Data Using Blockchain in Digital Document Sharing. Wirel. Pers. Commun. 134(2): 975-996 (2024) - [j18]Garima Verma:
Load Balancing in Cloud Environment Using Opposition Based Spider Monkey Optimization. Wirel. Pers. Commun. 137(2): 977-996 (2024) - 2023
- [j17]Garima Verma, Ashutosh Kumar:
Novel quantum key distribution and attribute based encryption for cloud data security. Concurr. Comput. Pract. Exp. 35(21) (2023) - [j16]Garima Verma:
Modified DNA-based Cryptography System in the Cloud: Deep Maxout-based Fined Tuned Key Generation. J. Web Eng. 22(8): 1075-1100 (2023) - [j15]Garima Verma, Soumen Kanrar:
Load balancing model for cloud environment using swarm intelligence technique. Multiagent Grid Syst. 19(3): 211-229 (2023) - [j14]Ashutosh Kumar, Garima Verma:
Revolutionizing Cloud Security: Leveraging Quantum Computing and Key Distribution for Enhanced Protection. Rev. Socionetwork Strateg. 17(2): 131-143 (2023) - [j13]Ashutosh Kumar, Garima Verma:
Secure Cloud Data Access: Unifying Quantum Key Distribution and Attribute-Based Encryption for Enhanced Data Protection. SN Comput. Sci. 4(6): 803 (2023) - [c1]Ashutosh Kumar, Garima Verma:
Secure Cloud Storage Access Framework Using Blockchain Technology. ISED 2023: 1-5 - 2022
- [j12]K. Rajakumari, M. Vinoth Kumar, Garima Verma, S. Balu, Dilip Kumar Sharma, Sudhakar Sengan:
Fuzzy Based Ant Colony Optimization Scheduling in Cloud Computing. Comput. Syst. Sci. Eng. 40(2): 581-592 (2022) - [j11]Garima Verma, Soumen Kanrar:
A novel model to enhance the data security in cloud environment. Multiagent Grid Syst. 18(1): 45-63 (2022) - [j10]Garima Verma, Soumen Kanrar:
Secure digital documents sharing using blockchain and attribute-based cryptosystem. Multiagent Grid Syst. 18(3-4): 365-379 (2022) - [j9]Garima Verma:
Secure VM Migration in Cloud: Multi-Criteria Perspective with Improved Optimization Model. Wirel. Pers. Commun. 124(1): 75-102 (2022) - 2021
- [j8]Rupak Chakraborty, Garima Verma, Suyel Namasudra:
IFODPSO-based multi-level image segmentation scheme aided with Masi entropy. J. Ambient Intell. Humaniz. Comput. 12(7): 7793-7811 (2021) - [j7]Hemraj Verma, Garima Verma, Pankaj Kumar:
Depression, Anxiety, and Stress During Times of COVID-19: An Analysis of Youngsters Studying in Higher Education in India. Rev. Socionetwork Strateg. 15(2): 471-488 (2021) - 2020
- [b1]Garima Verma:
A framework for image-based, automated, multilevel analysis of the cytoskeletal morphology. Sapienza University of Rome, Italy, 2020 - [j6]Hemraj Verma, Garima Verma:
Prediction Model for Bollywood Movie Success: A Comparative Analysis of Performance of Supervised Machine Learning Algorithms. Rev. Socionetwork Strateg. 14(1): 1-17 (2020) - [j5]Garima Verma, Hemraj Verma:
Hybrid-Deep Learning Model for Emotion Recognition Using Facial Expressions. Rev. Socionetwork Strateg. 14(2): 171-180 (2020) - [j4]Garima Verma, Sandhya Adhikari:
Cloud Computing Security Issues: a Stakeholder's Perspective. SN Comput. Sci. 1(1): 334 (2020)
2010 – 2019
- 2019
- [j3]Mohemmed Faraz Khan, Garima Verma, Perwez Alam, Mymoona Akhter, Md Afroz Bakht, Syed Misbahul Hasan, Mohammad Shaquiquzzaman, Mohammad Mumtaz Alam:
Dibenzepinones, dibenzoxepines and benzosuberones based p38α MAP kinase inhibitors: Their pharmacophore modelling, 3D-QSAR and docking studies. Comput. Biol. Medicine 110: 175-185 (2019) - [j2]Garima Verma, Rupak Chakraborty:
A Hybrid Privacy Preserving Scheme Using Finger Print Detection in Cloud Environment. Ingénierie des Systèmes d Inf. 24(3): 343-351 (2019) - 2018
- [j1]Garima Verma, Maria Laura Luciani, Alessandro Palombo, Linda Metaxa, Giovanna Panzironi, Federica Pediconi, Alessandro Giuliani, Mariano Bizzarri, Virginia Todde:
Microcalcification morphological descriptors and parenchyma fractal dimension hierarchically interact in breast cancer: A diagnostic perspective. Comput. Biol. Medicine 93: 1-6 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 22:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint