Dr. Himanshu Gupta

Professor
Amity University, India


Highest Degree
Ph.D. in Computer Science from Gurukul Kangri University, Hardwar, India

Share this Profile

Biography

1. Currently working as an Associate Professor in reputed international university Amity University Uttar Pradesh, India. 2. Working as Visiting Professor in American Heritage College, California, U.S.A 3. Completed all academic and professional education from reputed Central University Aligarh Muslim University, India. 4. More than 85 Scopus/UGC indexed research publications.

Area of Interest:

Computer Sciences
Cyber Security
Cloud Security
Cryptography
Network Security

Selected Publications

  1. Gupta, H. and V. Kumar, 2016. Multiple and Multiphase Encryption: An Approach in Modern Cryptography. Lambert Academic Publishing, Germany., ISBN: 978-3-659-85722-5, Pages: 172..
    Direct Link  |  

  2. Nanda, A. and H. Gupta, 2015. Anti-phishing techniques in cryptography. Int. J. Electr. Comput. Eng., 5: 1511-1515.
    Direct Link  |  

  3. Gupta, H. and Y. Mangla, 2015. Implementation of data security using biometric encryption. Int. J. Emerging Trends Electr. Electron., 11: 120-125.
    Direct Link  |  

  4. Gupta, H. and K. Chauhan, 2015. Role of biometric security for the enhancement of data security. Int. J. Comput. Technol., 14: 6184-6189.
    Direct Link  |  

  5. Garg, L. and H. Gupta, 2014. Analysis of elliptic curve cryptography. Int. J. Sci. Eng. Res., 5: 404-407.
    Direct Link  |  

  6. Dhaka, S. and H. Gupta, 2014. Recent attacks on elliptic curve cryptosystems (ECC). Indian Streams Res. J., 4: 1-4.
    Direct Link  |  

  7. Gupta, H. and V.K. Sharma, 2013. Role of multiple encryption in secure voice communication. Int. J. Comput. Sci. Electron. Eng., 1: 317-319.
    Direct Link  |  

  8. Gupta, H. and V.K. Sharma, 2013. Multiphase encryption: A new concept in modern cryptography. Int. J. Comput. Theory Eng., 5: 638-640.
    CrossRef  |  Direct Link  |  

  9. Gupta, H. and V.K. Sharma, 2011. Role of multiple encryption in secure electronic transaction. Int. J. Network Secur. Applic., 3: 89-96.
    CrossRef  |  Direct Link  |