| Issue | Title | |
| Vol 13, No 6: December 2023 | Secrecy performance analysis on spatial modeling of wireless communications with unmanned aerial vehicle and ground devices | Abstract PDF |
| Cuu Ho Van, Hong-Nhu Nguyen, Si-Phu Le, Miroslav Voznak | ||
| Vol 14, No 6: December 2024 | Sectoral vulnerabilities and adaptations to climate change: insights from a systematic literature review | Abstract PDF |
| Prihandoko Prihandoko, Agus Perdana Windarto, Musli Yanto, Muhammad Habib Yuhandri | ||
| Vol 9, No 4: August 2019 | Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hoc | Abstract PDF |
| santosh sahu, Sanjeev Sharma | ||
| Vol 13, No 3: June 2023 | Secure authentication and data aggregation scheme for routing packets in wireless sensor network | Abstract PDF |
| Rudramurthy Veeregowdanadoddi Chandraiah, Aparna Ramalingappa | ||
| Vol 14, No 4: August 2024 | Secure aware software development life cycle on medical datasets by using firefly optimization and machine learning techniques | Abstract PDF |
| Ooruchintala Obulesu, Sajja Suneel, Sudhakar Jangili, Sukanya Ledalla, Ballepu Swetha, Subba Reddy Borra | ||
| Vol 13, No 2: April 2023 | Secure cluster-based routing using multi objective-trust centric artificial algae algorithm for wireless sensor network | Abstract PDF |
| Divyashree Habbanakuppe Balachandra, Puttamadappa Chaluve Gowda, Nandini Prasad Kanakapura Shivaprasad | ||
| Vol 15, No 4: August 2025 | Secure clustering and routing – based adaptive – bald eagle search for wireless sensor networks | Abstract PDF |
| Roopashree Hejjaji Ranganathasharma, Yogeesh Ambalagere Chandrashekaraiah | ||
| Vol 9, No 6: December 2019 | Secure data aggregation in IoT using Efficient-CSDA | Abstract PDF |
| Swathi S, Yogish H K | ||
| Vol 14, No 6: December 2024 | Secure data transmission in power systems using blockchain technology | Abstract PDF |
| Anand Srivatsa, Ananthapadmanabha Thammaiah, Likith Kumar MV, Rajeshwari D, Suma AP | ||
| Vol 6, No 3: June 2016 | Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things | Abstract PDF |
| Sumanth Koppula, Jayabhaskar Muthukuru | ||
| Vol 6, No 4: August 2016 | Secure Multicast Routing Protocol in Manets Using Efficient ECGDH Algorithm | Abstract PDF |
| Gopi Arepalli, Suresh Babu Erukula | ||
| Vol 8, No 6: December 2018 | Secure Privacy Implications for Clients and End-users through Key Assortment Crypto Techniques Implicated Algorithm | Abstract PDF |
| Ramesh D, Rama B | ||
| Vol 15, No 1: February 2025 | Secured and cloud-based electronic health records by homomorphic encryption algorithm | Abstract PDF |
| Bala Annapurna, Gaddam Geetha, Priyanka Madhiraju, Subbarayan Kalaiselvi, Mishmala Sushith, Rathinasabapathy Ramadevi, Pramod Pandey | ||
| Vol 13, No 5: October 2023 | Secured authentication of radio-frequency identification system using PRESENT block cipher | Abstract PDF |
| Bharathi Ramachandra, Smitha Elsa Peter | ||
| Vol 11, No 1: February 2021 | Secured node detection technique based on artificial neural network for wireless sensor network | Abstract PDF |
| Bassam Hasan, Sameer Alani, Mohammed Ayad Saad | ||
| 5461 - 5475 of 6355 Items | << < 360 361 362 363 364 365 366 367 368 369 > >> | |
