Issue | Title | |
Vol 8, No 6 (2017) | Secure Modern Healthcare System Based on Internet of Things and Secret Sharing of IoT Healthcare Data | Abstract PDF |
Aaditya Jain, Bhupendra Kumar Soni | ||
Vol 11, No 5 (2020) | Secure Online Electronic Civil Registration Using Cloud Computing: A Conceptual Framework | Abstract PDF |
Ojo Olanrewaju, Akinade Abigail Oluwatoyin, O. Tokunbo-cole Mary | ||
Vol 8, No 6 (2017) | SECURE:An Ameliorated SQL Semiotic for Security | Abstract PDF |
Ajeet A. Chikkamannur, Shivanand M. Handigund | ||
Vol 10, No 2 (2018) | Secured Dynamic Clustering using Light Weighted Key Authentication for Target Tracking | Abstract PDF |
D. Ramesh, G. S. Biradar | ||
Vol 3, No 4 (2012) | Secured Reconfigurable Software Defined Radio Using OTA Software Download | Abstract PDF |
V. Jeyalakshmi, G. Vijayakumari | ||
Vol 1, No 2 (2009) | Secured Rekeying in B-Tree and NSBHO Tree | Abstract PDF |
P. Ramesh Kumar, P. Srinivasulu | ||
Vol 15, No 6 (2024) | SecureZone: Secure and Efficient Multipath Routing for Mobile Ad Hoc Networks | Abstract |
Rani Sahu, Vinay Sahu, Pushplata Chouksey, Sourabh Jain | ||
Vol 6, No 2 (2014) | Securing Cloud from Cloud Drain | Abstract PDF |
Niva Das, Tanmoy Sarkar | ||
Vol 7, No 6 (2016) | Securing Mobile Data using Cryptography | Abstract PDF |
Shikhar Bhagoliwal, Jyotirmoy Karjee | ||
Vol 4, No 2 (2012) | Securing Oracle Database from Search Engines Attack | Abstract PDF |
N. M. A. Ayad, H. M. Klash, S. Sorour | ||
Vol 6, No 2 (2014) | Security Issues in Cloud Computing - A Review | Abstract PDF |
Irfan Hussain, Imran Ashraf | ||
Vol 16, No 2 (2024) | Security Reinforcement: An Overview of Multilevel Authentication Techniques | Abstract |
Thamilvaani Arvaree | ||
Vol 7, No 1 (2015) | Security Solutions against Computer Networks Threats | Abstract PDF |
Fatemeh Soleimani Roozbahani, Reihaneh Azad | ||
Vol 4, No 4 (2013) | Security Threats in Wireless Sensor Networks in Each Layer | Abstract PDF |
Anitha S. Sastry, Shazia Sulthana, S. Vagdevi | ||
Vol 10, No 6 (2019) | Self-Protected Mobile Agent Paradigm for DDoS Threats using Block Chain Technology | Abstract PDF |
Mona Nasr | ||
Vol 11, No 1 (2019) | Semantic Ontology based IoT-Resource Description | Abstract PDF |
C. P. Vandana, Ajeet A. Chikkamannur | ||
Vol 10, No 1 (2018) | Semantically Enchanced Personalised Adaptive E-Learning for General and Dyslexia Learners: An Ontology Based Approach | Abstract PDF |
K. Chitra, R. Umamaheswari | ||
Vol 10, No 3 (2018) | Sentimental Analysis for Social Media–A Review | Abstract PDF |
R. Mahalakshmi, M. Nandhini, G. Kowsalya | ||
Vol 9, No 3 (2017) | Server-Based and Network-Assisted Solutions for Adaptive Video Streaming | Abstract PDF |
Koffka Khan, Wayne Goodridge | ||
Vol 12, No 5 (2021) | Short Survey of Data Mining and Web Mining using Cloud Computing | Abstract PDF |
Aye Pwint Phyu, Ei Ei Thu | ||
Vol 13, No 5 (2022) | SIG: A Gossip Based Energy Efficient Routing Protocol for WSN | Abstract PDF |
Sajal Saha, Moinul Islam Sayed, Pradip Das, BivashKanti Mukherjee | ||
Vol 4, No 1 (2012) | Signal Groups of Compatible Graph in Traffic Control Problems | Abstract PDF |
Arun Kumar Baruah, Niky Baruah | ||
Vol 12, No 6 (2021) | Significance of Big Data Frameworks and Speculative Approaches in Healthcare Systems | Abstract PDF |
G.P. Hegde, Nagaratna Hegde | ||
Vol 7, No 1 (2015) | Significant Data Hiding through Discrete Wavelet Transformation Approach | Abstract PDF |
Premal B. Nirpal, Ganesh M. Magar | ||
Vol 2, No 5 (2011) | Silhouette Based Human Motion Detection and Recognising their Actions from the Captured Video Streams | Abstract PDF |
N. A. Deepak, U. N. Sinha | ||
801 - 825 of 929 Items | First Previous 28 29 30 31 32 33 34 35 36 37 Next Last |
Browse Title Index
Scroll