|
Issue |
Title |
|
Vol 6, No 3: June 2016 |
Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things |
Abstract
PDF
|
Sumanth Koppula, Jayabhaskar Muthukuru |
|
Vol 6, No 4: August 2016 |
Secure Multicast Routing Protocol in Manets Using Efficient ECGDH Algorithm |
Abstract
PDF
|
Gopi Arepalli, Suresh Babu Erukula |
|
Vol 8, No 6: December 2018 |
Secure Privacy Implications for Clients and End-users through Key Assortment Crypto Techniques Implicated Algorithm |
Abstract
PDF
|
Ramesh D, Rama B |
|
Vol 13, No 5: October 2023 |
Secured authentication of radio-frequency identification system using PRESENT block cipher |
Abstract
PDF
|
Bharathi Ramachandra, Smitha Elsa Peter |
|
Vol 11, No 1: February 2021 |
Secured node detection technique based on artificial neural network for wireless sensor network |
Abstract
PDF
|
Bassam Hasan, Sameer Alani, Mohammed Ayad Saad |
|
Vol 9, No 2: April 2019 |
Securing multi-tenancy systems through multi DB instances and multiple databases on different physical servers |
Abstract
PDF
|
J. K. R Sastry, M. Trinath Basu |
|
Vol 9, No 5: October 2019 |
Securing vehicular cloud networks |
Abstract
PDF
|
Djilali Moussaoui, Mohamed Feham, Boucif Amar Bensaber, Benamar Kadri |
|
Vol 5, No 4: August 2015 |
Security against Timing Analysis Attack |
Abstract
PDF
|
Deevi Radha Rani, S Venkateswarlu |
|
Vol 12, No 1: February 2022 |
Security and imperceptibility improving of image steganography using pixel allocation and random function techniques |
Abstract
PDF
|
Noor Alhuda F. Abbas, Nida Abdulredha, Raed Khalid Ibrahim, Adnan Hussein Ali |
|
Vol 13, No 2: April 2023 |
Security and privacy in smart city: a secure e-voting system based on blockchain |
Abstract
PDF
|
Fatima zahrae Chentouf, Said Bouchkaren |
|
Vol 12, No 5: October 2022 |
Security and privacy recommendation of mobile app for Arabic speaking |
Abstract
PDF
|
Hameed Almubarak, Mohamed Khairallah Khouja, Ahmed Jedidi |
|
Vol 13, No 5: October 2023 |
Security and risk analysis in the cloud with software defined networking architecture |
Abstract
PDF
|
Venkata Nagaraju Thatha, Swapna Donepudi, Miriyala Aruna Safali, Surapaneni Phani Praveen, Nguyen Trong Tung, Nguyen Ha Huy Cuong |
|
Vol 9, No 6: December 2019 |
Security assessment framework for educational ERP systems |
Abstract
PDF
|
Hafsa Ashraf, Mamdouh Alenezi, Muhammad Nadeem, Yasir Javid |
|
Vol 11, No 5: October 2021 |
Security aware information classification in health care big data |
Abstract
PDF
|
Snehalata K. Funde, Gandharba Swain |
|
Vol 7, No 4: August 2017 |
Security Enhancement in Networked Embedded System |
Abstract
PDF
|
Pradip Ram Selokar, P T Karule |
|
Vol 10, No 1: February 2020 |
Security framework for cloud based electronic health record (EHR) system |
Abstract
PDF
|
Raghavendra Ganiga, Radhika M. Pai, Manohara Pai M. M., Rajesh Kumar Sinha |
|
Vol 7, No 2: April 2017 |
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent System in MANETS |
Abstract
PDF
|
Bandana Mahapatra, Srikanta Patnaik |
|
Vol 4, No 5: October 2014 |
Security of Biometric Data Using Compressed Watermarking Technique |
Abstract
PDF
|
Rohit Thanki, Komal Borisagar |
|
Vol 10, No 1: February 2020 |
Security system testing on electronic integrated antenatal care (e-iANC) |
Abstract
PDF
|
Hosizah Hosizah, Fachmi Tamzil |
|
Vol 10, No 1: February 2020 |
Security techniques for intelligent spam sensing and anomaly detection in online social platforms |
Abstract
PDF
|
Monther Aldwairi, Loai Tawalbeh |
|
4861 - 4880 of 5674 Items |
<< < 239 240 241 242 243 244 245 246 247 248 > >> |