Browse Title Index


 
Issue Title
 
Vol 8, No 10 (2016) Scheduling in Networked Control System for Monitoring and Protection Applications in Sensor Nodes Abstract
M. Sundar Rajan
 
Vol 5, No 3 (2013) Secure and Efficient RFID Authentication for Social Network in Cloud Abstract
Sherin Jobe, G. Venifa Mini, J. Jeya A. Celin
 
Vol 6, No 7 (2014) Secure Auditing Method for Cloud Computing Abstract
S. Srinivasan, K. Raja
 
Vol 8, No 3 (2016) Secure Authorized Deduplication in Hybrid Cloud with Public Auditing Abstract
J. Dhivya, R. Santhosh
 
Vol 7, No 4 (2015) Secure Communication for Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption Technique Abstract
A. Balakumar, R. Senthilkumar
 
Vol 7, No 8 (2015) Secure Data Deduplication at Client Side and in Cloud Storage with Application Aware System Abstract
Dipti Balasaheb Bansode, Amar Buchade
 
Vol 10, No 4 (2018) Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Abstract
G. Swathika, R. Vijayalakshmi
 
Vol 10, No 8 (2018) Secure Data Sharing in Cloud Computing using RS-IBE Abstract
T. Amith Kumar
 
Vol 2, No 6 (2010) Secure Data Transmission in Wireless Sensor Network Using Randomized Multipath Routes Abstract
K. Soundar Rajan
 
Vol 4, No 7 (2012) Secure Low Cost FPGA-based AMI System using LTE Technology Abstract
M. M. Abutaleb, A. M. Allam
 
Vol 2, No 5 (2010) Secure Multi Server Strong-Password Authentication Using Two Factor Approach (Image Password and Mobile) Abstract
R. Kanakasundara Rao
 
Vol 3, No 11 (2011) Secure Multicast Routing Protocol against Insider Attacks in MANET Abstract
V. Jayalakshmi, R. Rameshkumar
 
Vol 8, No 5 (2016) Secure Preserving Public Auditing for Regenerating Code based on Cloud Storage Abstract
S. Nalini Poornima, R. S. Ponmagal
 
Vol 6, No 2 (2014) Secure Probabilistic Location Verification for Wireless Sensor Networks Abstract
R. Vidhyalakshmi, G. Surya
 
Vol 7, No 6 (2015) Secure Socket Layer and its Security Analysis Abstract
Deepika Bansal, Priya Sethi, Shipra Kataria
 
Vol 10, No 6 (2018) Secure User Input Privacy in Website at A Large Scale Abstract
V. Vedhavalli, J. Kalaivani
 
Vol 8, No 6 (2016) Secured Cloud Based Healthcare System for Transformation Infrastructure Abstract
P. Anbumani, N.M. Abroja
 
Vol 4, No 14 (2012) Secured Data Transmission by Blowfish Algorithm Using OFDM Abstract
T. S. Murugesh, B. Balraj
 
Vol 4, No 14 (2012) Secured Multipath Routing Protocol for Black Hole Attacks Based on Secret Sharing in MANETs Abstract
C. Chandrasekar, S. Padmavathy
 
Vol 5, No 1 (2013) Secured Routing Protocol Based on Secret Sharing in Voice Systems Abstract
C. Chandrasekar, S. Padmavathy
 
Vol 7, No 4 (2015) Securing API Using API Gateway Abstract
Arpita Gangrade, Bhawna Nigam
 
Vol 8, No 5 (2016) Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography Abstract
K. Saranya, P. Kavitha
 
Vol 5, No 4 (2013) Securing Information Using Cryptography and Steganography Technique Abstract
V. Hemanth, Mahammad Shareef
 
Vol 4, No 2 (2012) Securing IP Address to Control IP Spoofing Abstract
Rainey C. Lal, Mridu Sahu
 
Vol 1, No 4 (2009) Securing Web Services through WS-Security in SOAP Protocol Abstract
N. Sasikala Devi, L. Arockiam
 
776 - 800 of 922 Items First Previous 27 28 29 30 31 32 33 34 35 36 Next Last