Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Abhishek Dwivedi is active.

Publication


Featured researches published by Abhishek Dwivedi.


ACITY (3) | 2013

A Cryptographic Algorithm Analysis for Security Threats of Semantic E-Commerce Web (SECW) for Electronic Payment Transaction System

Akhilesh Dwivedi; Abhishek Dwivedi; Suresh Kumar; Satish Kumar Pandey; Priyanka Dabra

Semantic Web Services (SWS) are crucial function of the Semantic Web, traditionally focused on discovery and composition of e-services. In the area of e-commerce services, e-commerce processes require the confidentiality of customer information, the integrity of product offers and the availability of the vendors’ servers. E-commerce extends the banking a good chance, but also creates a set of new risks and vulnerability such as security threats. Through the electronic transaction security is the most important phenomena to enhance the banking transaction security via e-payment transaction. Therefore our main contribution is an essential management and technical requirement for any efficient and effective e-payment transaction activities over Semantic Web.


International Journal of Computer Applications | 2011

Cancellable Biometrics for Security and Privacy Enforcement on Semantic Web

Akhilesh Dwivedi; Suresh Kumar; Abhishek Dwivedi; Manjeet Singh

The entire vision of the Semantic web has nonetheless to be totally accomplished, however there has been considerable progress inside the development and use of standards, languages, technologies and applications. Hence, the Semantic web must be conscious of different types of risks, privacy issues and security issues to stay efficient and secure. Biometric systems provide the answer to confirm that only a legitimate user and nobody else access the rendered services. The safety depends on the secrecy, privacy and trustworthiness of the authenticators because deeper the trust level of authenticator, stronger are going to be security and privacy of Semantic web. Cancellable biometrics and secure sketches have been introduced with the same purpose to guard the privacy of biometric templates to enhance the security and privacy of Semantic Web Services.


International Journal of Computer Applications | 2011

An Authenticated Two-Tier Security on Transmission of Medical Image using Codebase Cryptosystem over Teeming Channel

Deo Brat Ojha; Ajay K. Sharma; Abhishek Dwivedi; Bhupendra Kumar; Amit Kumar

In this paper, we present an efficient and authentic transmission scheme without digital signature on an algebraic coding theory based public key cryptosystem of medical information like Image, Audio, Video etc. via the combination of stegnographic and cryptographic approach. Stegnographic approach facilitates data hiding, McEliece public-key cryptosystem to encrypts the data,.lossless compression provides us integrity and Fuzzy error correction provides error less message over noisy channel.


International Journal of Computer Applications | 2014

Mobile Stand-alone Application Code Off-loading: Architecture and Challenges

Abhishek Dwivedi; Padmaja Joshi; Abhay Kolhe

migrating code for execution from a device to a remote server has been a topic of active research for nearly a few years now. With the advent and the rapid growth of mobile devices, this area has been extended to mobile operating systems. Although mobile devices such as phones and tablets are available with increasing the hardware specifications to include more RAM and CPU cores, they do not often keep up with the demands of ever growing mobile applications. In the context of mobile devices, this field has come to be known as Mobile Cloud Computing (MCC). It combines mobile computing and cloud computing to achieve dynamic code migration of applications to a remote server, achieve reduced power usage and faster execution. In this paper, a review of the most prevalent techniques of MCC that are shaping this field is done. The paper also covers the complete architecture that is used to achieve these results. Along with various architectures, approaches a study of their advantages and disadvantages, as well as the way forward is discussed.


Journal of clinical and diagnostic research : JCDR | 2016

Role of HRCT Chest in Post Stem Cell Transplant Recipients Suspected of Pulmonary Complications.

Abhishek Dwivedi; R Ravi Kumar; Ajay K. Sharma; S K Pannu

INTRODUCTION Stem cell transplantation is todays procedure of choice for management of various hematopoietic malignant and severe immunogenic disorders. High Resolution Computed Tomography (HRCT) is a common technique for the diagnosis of pulmonary complications in stem cell transplant recipients. There are a large number of complications which can complicate the post-transplant period. AIM To study the role of HRCT chest in stem cell transplant patients developing pulmonary complications, detect any evidence of infection, detect clinical signs of lung infections, Graft versus Host Disease (GvHD) or other regimen related toxicities outlined earlier, detect any evidence of GvHD and correlate these clinical signs with radiological changes in the lungs. MATERIALS AND METHODS The study was a prospective study of 52 participants with indication of stem cell transplantation. The study included recipients of HSCT transplant and the exclusion criteria was patients who failed for engraftment and having an associated history of pulmonary embolism. Patients were screened for pre-transplant chemotherapy, clinical examination, laboratory investigations including blood and biochemical examinations, imaging by ultrasound, chest radiography, baseline HRCT and a follow-up for post-transplant infections and complications with 16 slice Siemens CT scan. Statistical analysis was done using Pearsons chi-squared test. RESULTS Four patients among the total 56 were excluded due to non-engraftment. The most common associated findings in decreasing order are (these patients died): consolidation, pancytopenia and gastrointestinal tract symptoms with VOD (Veno-Occlusive Disease). These findings were seen on HRCT as consolidation, cavities, ground glass opacities, fibrotic changes, bronchiectatic changes and tree in bud appearance. CONCLUSION The study highlights the significant positive findings on the HRCT which were missed on routine chest radiograph and can be used for early diagnoses. Thus, HRCT helped in decreasing the mortality. The abnormal vitals and TLC counts showed a significant relation between the numbers of death in the study.


Archive | 2011

Current Security Considerations for Issues and Challenges of Trustworthy Semantic Web

Akhilesh Dwivedi; Suresh Kumar; Abhishek Dwivedi; Raj Kumar; Manjeet Singh


Archive | 2011

An Authenticated Transmission of Medical Image with Codebase Cryptosystem over Noisy Channel

Deo Brat Ojha; Raj Kumar; A. Sharma; Abhishek Dwivedi; Amit Kumar


Journal of Global Research in Computer Sciences | 2011

Transmission of Large Information through KAP Using Non-Abelian Group

Abhishek Dwivedi; Deo Brat Ojha; Ajay K. Sharma; Ramveer Singh; Awakash Mishra


Journal of Global Research in Computer Sciences | 2011

A Model of Key Agreement Protocol using Polynomials over Non-Cummutative Division Semirings

Abhishek Dwivedi; Deo Brat Ojha; Ajay K. Sharma; Awakash Mishra


Journal of Global Research in Computer Sciences | 2010

A NON-REPUDIABLE BIASED BITSTRING KEY-AGREEMENT PROTOCOL WITHROOT PROBLEM IN NON-ABELIAN GROUP

Abhishek Dwivedi; Deo Brat Ojha

Collaboration


Dive into the Abhishek Dwivedi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ajay K. Sharma

National Institute of Technology Delhi

View shared research outputs
Top Co-Authors

Avatar

Suresh Kumar

Manav Rachna International University

View shared research outputs
Top Co-Authors

Avatar

Amit Kumar

Indian Veterinary Research Institute

View shared research outputs
Top Co-Authors

Avatar

Awakash Mishra

Indira Gandhi Centre for Atomic Research

View shared research outputs
Top Co-Authors

Avatar

Manjeet Singh

YMCA University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Raj Kumar

Central University of Punjab

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ramveer Singh

Indian Institute of Technology Roorkee

View shared research outputs
Researchain Logo
Decentralizing Knowledge