| Issue | Title | |
| Vol 9, No 6: December 2019 | Secure data aggregation in IoT using Efficient-CSDA | Abstract PDF |
| Swathi S, Yogish H K | ||
| Vol 14, No 6: December 2024 | Secure data transmission in power systems using blockchain technology | Abstract PDF |
| Anand Srivatsa, Ananthapadmanabha Thammaiah, Likith Kumar MV, Rajeshwari D, Suma AP | ||
| Vol 6, No 3: June 2016 | Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things | Abstract PDF |
| Sumanth Koppula, Jayabhaskar Muthukuru | ||
| Vol 6, No 4: August 2016 | Secure Multicast Routing Protocol in Manets Using Efficient ECGDH Algorithm | Abstract PDF |
| Gopi Arepalli, Suresh Babu Erukula | ||
| Vol 8, No 6: December 2018 | Secure Privacy Implications for Clients and End-users through Key Assortment Crypto Techniques Implicated Algorithm | Abstract PDF |
| Ramesh D, Rama B | ||
| Vol 15, No 1: February 2025 | Secured and cloud-based electronic health records by homomorphic encryption algorithm | Abstract PDF |
| Bala Annapurna, Gaddam Geetha, Priyanka Madhiraju, Subbarayan Kalaiselvi, Mishmala Sushith, Rathinasabapathy Ramadevi, Pramod Pandey | ||
| Vol 13, No 5: October 2023 | Secured authentication of radio-frequency identification system using PRESENT block cipher | Abstract PDF |
| Bharathi Ramachandra, Smitha Elsa Peter | ||
| Vol 11, No 1: February 2021 | Secured node detection technique based on artificial neural network for wireless sensor network | Abstract PDF |
| Bassam Hasan, Sameer Alani, Mohammed Ayad Saad | ||
| Vol 15, No 6: December 2025 | Securing healthcare data and optimizing digital marketing through machine learning: the CAML-EHDS framework | Abstract PDF |
| Fathi Abderrahmane, Mouyassir Kawtar, Ali Waqas, Fandi Fatima Zahra, Kartit Ali | ||
| Vol 9, No 2: April 2019 | Securing multi-tenancy systems through multi DB instances and multiple databases on different physical servers | Abstract PDF |
| J. K. R Sastry, M. Trinath Basu | ||
| Vol 9, No 5: October 2019 | Securing vehicular cloud networks | Abstract PDF |
| Djilali Moussaoui, Mohamed Feham, Boucif Amar Bensaber, Benamar Kadri | ||
| Vol 5, No 4: August 2015 | Security against Timing Analysis Attack | Abstract PDF |
| Deevi Radha Rani, S Venkateswarlu | ||
| Vol 12, No 1: February 2022 | Security and imperceptibility improving of image steganography using pixel allocation and random function techniques | Abstract PDF |
| Noor Alhuda F. Abbas, Nida Abdulredha, Raed Khalid Ibrahim, Adnan Hussein Ali | ||
| Vol 13, No 2: April 2023 | Security and privacy in smart city: a secure e-voting system based on blockchain | Abstract PDF |
| Fatima zahrae Chentouf, Said Bouchkaren | ||
| Vol 12, No 5: October 2022 | Security and privacy recommendation of mobile app for Arabic speaking | Abstract PDF |
| Hameed Almubarak, Mohamed Khairallah Khouja, Ahmed Jedidi | ||
| 5506 - 5520 of 6399 Items | << < 363 364 365 366 367 368 369 370 371 372 > >> | |
