Journal | Issue | Title | |
AIRCC's International Journal of Computer Science and Information Technology | Vol 15, No 5 (2023) | Secure Arcade: A Gamified Defense Against Cyber Attacks | Abstract PDF |
Sean Loesch, Ryan Hrastich, Jordan Herbert, Ben Drangstveit, Jacob Weber, Mounika Vanamala | |||
Oriental Journal of Computer Science and Technology | Vol 10, No 2 (2017) | Secure ASP.NET Web Application by Discovering Broken Authentication and Session Management Vulnerabilities | Abstract PDF |
Rupal R. Sharma, Ravi K. Sheth | |||
ICTACT Journal on Soft Computing | Vol 11, No 4 (2021) | Secure Association Rule Mining on Vertically Partitioned Data using Fully Homomorphic Encryption | Abstract |
M. Yogasini, B. N. Prathibha | |||
Networking and Communication Engineering | Vol 6, No 7 (2014) | Secure Auditing Method for Cloud Computing | Abstract |
S. Srinivasan, K. Raja | |||
Software Engineering | Vol 8, No 4 (2016) | Secure Authentication System for Civil Registry | Abstract |
B. Indhumathy, R. Aktharunisa Begum | |||
International Journal of Advanced Networking and Applications | Vol 7, No 6 (2016) | Secure Authorised De-Duplication using Convergent Encryption Technique | Abstract PDF |
B. Sangeetha, E. S. K. Vijay Anand | |||
Networking and Communication Engineering | Vol 8, No 3 (2016) | Secure Authorized Deduplication in Hybrid Cloud with Public Auditing | Abstract |
J. Dhivya, R. Santhosh | |||
Data Mining and Knowledge Engineering | Vol 8, No 6 (2016) | Secure Authorized De-duplication with Hybrid Cloud Approach | Abstract |
Minal Pore, Nilav Mukhopadhyay | |||
Data Mining and Knowledge Engineering | Vol 4, No 9 (2012) | Secure Browsing Using Browser Operating System Virtualization | Abstract |
Satish Kumar Ray, Toran Verma, Sipi Dubey | |||
Fuzzy Systems | Vol 7, No 3 (2015) | Secure Channel Aware Routing Protocol to Detect Malicious Nodes in Wireless Networks | Abstract |
Amrutha Mohan, K. Siva Kumar | |||
Fuzzy Systems | Vol 6, No 3 (2014) | Secure Cloud Architecture for Hospital Information System | Abstract |
C. Menaka, R. S. Ponmagal | |||
Networking and Communication Engineering | Vol 7, No 4 (2015) | Secure Communication for Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption Technique | Abstract |
A. Balakumar, R. Senthilkumar | |||
Manufacturing Technology Today | Vol 4, No 8 (2005) | Secure Communication System Developed | Abstract |
Reason-A Technical Journal (Formerly Reason-A Technical Magazine) | Vol 9 (2010) | Secure Communication System Using Chaos via Phase Shift Keying | Abstract PDF |
Krishnendu Chakrabarty | |||
Software Engineering | Vol 5, No 8 (2013) | Secure Comprehensive File Distribution Schemes for Network Coding Driven P2P Systems | Abstract |
Pavan Kumar Zammalamadaka, Yuva Krishna Aluri | |||
ICTACT Journal on Communication Technology | Vol 10, No 4 (2019) | Secure Data Aggregation in WSN using Synopsis Diffusion | Abstract |
S. Vimalnath, G. Ravi | |||
Oriental Journal of Computer Science and Technology | Vol 3, No 1 (2010) | Secure Data Aggregation Using Mobile Agents in Wireless Sensor Networks | Abstract PDF |
Bhavna Arora Makin, Devanand Padha | |||
International Journal of Science, Engineering and Computer Technology | Vol 2, No 3 (2012) | Secure Data Communication in Mobile Ad-Hoc Network Using IPSec Protocol | Abstract |
Dolly Dhall, Hitesh Dhall, Pooja Madaan, Jagbir Singh Ahlawat | |||
Fuzzy Systems | Vol 3, No 8 (2011) | Secure Data Communication Using Random Bit Substitution | Abstract |
J. Asha, A. Poonam Baid | |||
Networking and Communication Engineering | Vol 7, No 8 (2015) | Secure Data Deduplication at Client Side and in Cloud Storage with Application Aware System | Abstract |
Dipti Balasaheb Bansode, Amar Buchade | |||
Networking and Communication Engineering | Vol 10, No 4 (2018) | Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks | Abstract |
G. Swathika, R. Vijayalakshmi | |||
Wireless Communication | Vol 7, No 4 (2015) | Secure Data Share in Drop Box Using Key-Aggregate Cryptosystem | Abstract |
E. Elamathi, Aroky Raju, K. Ravikumar | |||
Networking and Communication Engineering | Vol 10, No 8 (2018) | Secure Data Sharing in Cloud Computing using RS-IBE | Abstract |
T. Amith Kumar | |||
Data Mining and Knowledge Engineering | Vol 8, No 4 (2016) | Secure Data Sharing in Cloud Without Certificate Verification Process Using Id-Based Proxy Ring Signature | Abstract |
S. Balaji | |||
Wireless Communication | Vol 7, No 3 (2015) | Secure Data Storage in Cloud with Decentralized Access Control Scheme and Anonymous Authentication | Abstract |
S. RamaLakshmi, V. Suganya, B. Saranya, V. Srinivasan | |||
89176 - 89200 of 110868 Items | First Previous 3563 3564 3565 3566 3567 3568 3569 3570 3571 3572 Next Last |
Browse Title Index
Scroll