Browse Title Index


 
Journal Issue Title
 
AIRCC's International Journal of Computer Science and Information Technology Vol 15, No 5 (2023) Secure Arcade: A Gamified Defense Against Cyber Attacks Abstract   PDF
Sean Loesch, Ryan Hrastich, Jordan Herbert, Ben Drangstveit, Jacob Weber, Mounika Vanamala
 
Oriental Journal of Computer Science and Technology Vol 10, No 2 (2017) Secure ASP.NET Web Application by Discovering Broken Authentication and Session Management Vulnerabilities Abstract   PDF
Rupal R. Sharma, Ravi K. Sheth
 
ICTACT Journal on Soft Computing Vol 11, No 4 (2021) Secure Association Rule Mining on Vertically Partitioned Data using Fully Homomorphic Encryption Abstract
M. Yogasini, B. N. Prathibha
 
Networking and Communication Engineering Vol 6, No 7 (2014) Secure Auditing Method for Cloud Computing Abstract
S. Srinivasan, K. Raja
 
Software Engineering Vol 8, No 4 (2016) Secure Authentication System for Civil Registry Abstract
B. Indhumathy, R. Aktharunisa Begum
 
International Journal of Advanced Networking and Applications Vol 7, No 6 (2016) Secure Authorised De-Duplication using Convergent Encryption Technique Abstract   PDF
B. Sangeetha, E. S. K. Vijay Anand
 
Networking and Communication Engineering Vol 8, No 3 (2016) Secure Authorized Deduplication in Hybrid Cloud with Public Auditing Abstract
J. Dhivya, R. Santhosh
 
Data Mining and Knowledge Engineering Vol 8, No 6 (2016) Secure Authorized De-duplication with Hybrid Cloud Approach Abstract
Minal Pore, Nilav Mukhopadhyay
 
Data Mining and Knowledge Engineering Vol 4, No 9 (2012) Secure Browsing Using Browser Operating System Virtualization Abstract
Satish Kumar Ray, Toran Verma, Sipi Dubey
 
Fuzzy Systems Vol 7, No 3 (2015) Secure Channel Aware Routing Protocol to Detect Malicious Nodes in Wireless Networks Abstract
Amrutha Mohan, K. Siva Kumar
 
Fuzzy Systems Vol 6, No 3 (2014) Secure Cloud Architecture for Hospital Information System Abstract
C. Menaka, R. S. Ponmagal
 
Networking and Communication Engineering Vol 7, No 4 (2015) Secure Communication for Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption Technique Abstract
A. Balakumar, R. Senthilkumar
 
Manufacturing Technology Today Vol 4, No 8 (2005) Secure Communication System Developed Abstract
 
Reason-A Technical Journal (Formerly Reason-A Technical Magazine) Vol 9 (2010) Secure Communication System Using Chaos via Phase Shift Keying Abstract   PDF
Krishnendu Chakrabarty
 
Software Engineering Vol 5, No 8 (2013) Secure Comprehensive File Distribution Schemes for Network Coding Driven P2P Systems Abstract
Pavan Kumar Zammalamadaka, Yuva Krishna Aluri
 
ICTACT Journal on Communication Technology Vol 10, No 4 (2019) Secure Data Aggregation in WSN using Synopsis Diffusion Abstract
S. Vimalnath, G. Ravi
 
Oriental Journal of Computer Science and Technology Vol 3, No 1 (2010) Secure Data Aggregation Using Mobile Agents in Wireless Sensor Networks Abstract   PDF
Bhavna Arora Makin, Devanand Padha
 
International Journal of Science, Engineering and Computer Technology Vol 2, No 3 (2012) Secure Data Communication in Mobile Ad-Hoc Network Using IPSec Protocol Abstract
Dolly Dhall, Hitesh Dhall, Pooja Madaan, Jagbir Singh Ahlawat
 
Fuzzy Systems Vol 3, No 8 (2011) Secure Data Communication Using Random Bit Substitution Abstract
J. Asha, A. Poonam Baid
 
Networking and Communication Engineering Vol 7, No 8 (2015) Secure Data Deduplication at Client Side and in Cloud Storage with Application Aware System Abstract
Dipti Balasaheb Bansode, Amar Buchade
 
Networking and Communication Engineering Vol 10, No 4 (2018) Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Abstract
G. Swathika, R. Vijayalakshmi
 
Wireless Communication Vol 7, No 4 (2015) Secure Data Share in Drop Box Using Key-Aggregate Cryptosystem Abstract
E. Elamathi, Aroky Raju, K. Ravikumar
 
Networking and Communication Engineering Vol 10, No 8 (2018) Secure Data Sharing in Cloud Computing using RS-IBE Abstract
T. Amith Kumar
 
Data Mining and Knowledge Engineering Vol 8, No 4 (2016) Secure Data Sharing in Cloud Without Certificate Verification Process Using Id-Based Proxy Ring Signature Abstract
S. Balaji
 
Wireless Communication Vol 7, No 3 (2015) Secure Data Storage in Cloud with Decentralized Access Control Scheme and Anonymous Authentication Abstract
S. RamaLakshmi, V. Suganya, B. Saranya, V. Srinivasan
 
89176 - 89200 of 110868 Items First Previous 3563 3564 3565 3566 3567 3568 3569 3570 3571 3572 Next Last