|
Issue |
Title |
|
Vol 14, No 4: August 2024 |
Secure aware software development life cycle on medical datasets by using firefly optimization and machine learning techniques |
Abstract
PDF
|
Ooruchintala Obulesu, Sajja Suneel, Sudhakar Jangili, Sukanya Ledalla, Ballepu Swetha, Subba Reddy Borra |
|
Vol 13, No 2: April 2023 |
Secure cluster-based routing using multi objective-trust centric artificial algae algorithm for wireless sensor network |
Abstract
PDF
|
Divyashree Habbanakuppe Balachandra, Puttamadappa Chaluve Gowda, Nandini Prasad Kanakapura Shivaprasad |
|
Vol 9, No 6: December 2019 |
Secure data aggregation in IoT using Efficient-CSDA |
Abstract
PDF
|
Swathi S, Yogish H K |
|
Vol 14, No 6: December 2024 |
Secure data transmission in power systems using blockchain technology |
Abstract
PDF
|
Anand Srivatsa, Ananthapadmanabha Thammaiah, Likith Kumar MV, Rajeshwari D, Suma AP |
|
Vol 6, No 3: June 2016 |
Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things |
Abstract
PDF
|
Sumanth Koppula, Jayabhaskar Muthukuru |
|
Vol 6, No 4: August 2016 |
Secure Multicast Routing Protocol in Manets Using Efficient ECGDH Algorithm |
Abstract
PDF
|
Gopi Arepalli, Suresh Babu Erukula |
|
Vol 8, No 6: December 2018 |
Secure Privacy Implications for Clients and End-users through Key Assortment Crypto Techniques Implicated Algorithm |
Abstract
PDF
|
Ramesh D, Rama B |
|
Vol 15, No 1: February 2025 |
Secured and cloud-based electronic health records by homomorphic encryption algorithm |
Abstract
PDF
|
Bala Annapurna, Gaddam Geetha, Priyanka Madhiraju, Subbarayan Kalaiselvi, Mishmala Sushith, Rathinasabapathy Ramadevi, Pramod Pandey |
|
Vol 13, No 5: October 2023 |
Secured authentication of radio-frequency identification system using PRESENT block cipher |
Abstract
PDF
|
Bharathi Ramachandra, Smitha Elsa Peter |
|
Vol 11, No 1: February 2021 |
Secured node detection technique based on artificial neural network for wireless sensor network |
Abstract
PDF
|
Bassam Hasan, Sameer Alani, Mohammed Ayad Saad |
|
Vol 9, No 2: April 2019 |
Securing multi-tenancy systems through multi DB instances and multiple databases on different physical servers |
Abstract
PDF
|
J. K. R Sastry, M. Trinath Basu |
|
Vol 9, No 5: October 2019 |
Securing vehicular cloud networks |
Abstract
PDF
|
Djilali Moussaoui, Mohamed Feham, Boucif Amar Bensaber, Benamar Kadri |
|
Vol 5, No 4: August 2015 |
Security against Timing Analysis Attack |
Abstract
PDF
|
Deevi Radha Rani, S Venkateswarlu |
|
Vol 12, No 1: February 2022 |
Security and imperceptibility improving of image steganography using pixel allocation and random function techniques |
Abstract
PDF
|
Noor Alhuda F. Abbas, Nida Abdulredha, Raed Khalid Ibrahim, Adnan Hussein Ali |
|
Vol 13, No 2: April 2023 |
Security and privacy in smart city: a secure e-voting system based on blockchain |
Abstract
PDF
|
Fatima zahrae Chentouf, Said Bouchkaren |
|
5056 - 5070 of 5896 Items |
<< < 333 334 335 336 337 338 339 340 341 342 > >> |