Issue | Title | |
Vol 8, No 10 (2016) | Scheduling in Networked Control System for Monitoring and Protection Applications in Sensor Nodes | Abstract |
M. Sundar Rajan | ||
Vol 5, No 3 (2013) | Secure and Efficient RFID Authentication for Social Network in Cloud | Abstract |
Sherin Jobe, G. Venifa Mini, J. Jeya A. Celin | ||
Vol 6, No 7 (2014) | Secure Auditing Method for Cloud Computing | Abstract |
S. Srinivasan, K. Raja | ||
Vol 8, No 3 (2016) | Secure Authorized Deduplication in Hybrid Cloud with Public Auditing | Abstract |
J. Dhivya, R. Santhosh | ||
Vol 7, No 4 (2015) | Secure Communication for Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption Technique | Abstract |
A. Balakumar, R. Senthilkumar | ||
Vol 7, No 8 (2015) | Secure Data Deduplication at Client Side and in Cloud Storage with Application Aware System | Abstract |
Dipti Balasaheb Bansode, Amar Buchade | ||
Vol 10, No 4 (2018) | Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks | Abstract |
G. Swathika, R. Vijayalakshmi | ||
Vol 10, No 8 (2018) | Secure Data Sharing in Cloud Computing using RS-IBE | Abstract |
T. Amith Kumar | ||
Vol 2, No 6 (2010) | Secure Data Transmission in Wireless Sensor Network Using Randomized Multipath Routes | Abstract |
K. Soundar Rajan | ||
Vol 4, No 7 (2012) | Secure Low Cost FPGA-based AMI System using LTE Technology | Abstract |
M. M. Abutaleb, A. M. Allam | ||
Vol 2, No 5 (2010) | Secure Multi Server Strong-Password Authentication Using Two Factor Approach (Image Password and Mobile) | Abstract |
R. Kanakasundara Rao | ||
Vol 3, No 11 (2011) | Secure Multicast Routing Protocol against Insider Attacks in MANET | Abstract |
V. Jayalakshmi, R. Rameshkumar | ||
Vol 8, No 5 (2016) | Secure Preserving Public Auditing for Regenerating Code based on Cloud Storage | Abstract |
S. Nalini Poornima, R. S. Ponmagal | ||
Vol 6, No 2 (2014) | Secure Probabilistic Location Verification for Wireless Sensor Networks | Abstract |
R. Vidhyalakshmi, G. Surya | ||
Vol 7, No 6 (2015) | Secure Socket Layer and its Security Analysis | Abstract |
Deepika Bansal, Priya Sethi, Shipra Kataria | ||
Vol 10, No 6 (2018) | Secure User Input Privacy in Website at A Large Scale | Abstract |
V. Vedhavalli, J. Kalaivani | ||
Vol 8, No 6 (2016) | Secured Cloud Based Healthcare System for Transformation Infrastructure | Abstract |
P. Anbumani, N.M. Abroja | ||
Vol 4, No 14 (2012) | Secured Data Transmission by Blowfish Algorithm Using OFDM | Abstract |
T. S. Murugesh, B. Balraj | ||
Vol 4, No 14 (2012) | Secured Multipath Routing Protocol for Black Hole Attacks Based on Secret Sharing in MANETs | Abstract |
C. Chandrasekar, S. Padmavathy | ||
Vol 5, No 1 (2013) | Secured Routing Protocol Based on Secret Sharing in Voice Systems | Abstract |
C. Chandrasekar, S. Padmavathy | ||
Vol 7, No 4 (2015) | Securing API Using API Gateway | Abstract |
Arpita Gangrade, Bhawna Nigam | ||
Vol 8, No 5 (2016) | Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography | Abstract |
K. Saranya, P. Kavitha | ||
Vol 5, No 4 (2013) | Securing Information Using Cryptography and Steganography Technique | Abstract |
V. Hemanth, Mahammad Shareef | ||
Vol 4, No 2 (2012) | Securing IP Address to Control IP Spoofing | Abstract |
Rainey C. Lal, Mridu Sahu | ||
Vol 1, No 4 (2009) | Securing Web Services through WS-Security in SOAP Protocol | Abstract |
N. Sasikala Devi, L. Arockiam | ||
776 - 800 of 922 Items | First Previous 27 28 29 30 31 32 33 34 35 36 Next Last |
Browse Title Index
Scroll