Journal | Issue | Title | |
Automation and Autonomous Systems | Vol 3, No 2 (2011) | Secure Data Storage in Distributed Database Systems | Abstract |
T. Sudalai Muthu, G. Vasanth, Rukmini Durgale, Suresh Babu | |||
Networking and Communication Engineering | Vol 2, No 6 (2010) | Secure Data Transmission in Wireless Sensor Network Using Randomized Multipath Routes | Abstract |
K. Soundar Rajan | |||
Wireless Communication | Vol 4, No 12 (2012) | Secure Data Transmission in Wireless Sensor Networks using Randomized Dispersive Paths | Abstract |
Dhirajkumar Shelke, Pushkar Sathe, Omkar Sabane, Vinod Sawant | |||
Wireless Communication | Vol 5, No 11 (2013) | Secure Data Transmission Using Cloud Computing | Abstract |
Trinath Naralasetty, K. Eswar | |||
Wireless Communication | Vol 7, No 7 (2015) | Secure Deduplication with Reliable Convergent Key Management in Hybrid Cloud | Abstract |
M. Gomathi Pradeepa, S. Geetha | |||
Digital Image Processing | Vol 6, No 2 (2014) | Secure Digital Watermarking Techniques Based Authentication | Abstract |
C. Sathiyakumar, K. Boopathi, R. Elavarasi, P. Rajapathy | |||
Data Mining and Knowledge Engineering | Vol 5, No 3 (2013) | Secure DP Service Composition with Query Optimization | Abstract |
Amit B. Chougule, Rashmi R. Kulkarni | |||
Oriental Journal of Computer Science and Technology | Vol 5, No 2 (2012) | Secure Dynamic Data Aggregation Routing Protocol for Wireless Sensor Networks | Abstract PDF |
Bhawana Mathur | |||
International Journal of Advanced Networking and Applications | Vol 13, No 1 (2021) | Secure Group Key Management Scheme for Dynamic Vehicular Cloud Computing | Abstract PDF |
Nayana Hegde, Sunilkumar S. Manvi | |||
Wireless Communication | Vol 8, No 3 (2016) | Secure Group Sharing in Dynamic Public Cloud Environment | Abstract |
R. Santhosh, M. Veeramanikandan | |||
International Journal of Advanced Networking and Applications | Vol 11, No 6 (2020) | Secure Handover Protocol for High Speed 5G Networks | Abstract PDF |
Vincent Omollo Nyangaresi, Anthony J. Rodrigues, Silvance O. Abeka | |||
Wireless Communication | Vol 7, No 7 (2015) | Secure Image Steganography Combined with DES Encryption | Abstract |
K. Veeramanikandan, P. Manjamadevi, K. Latha | |||
Digital Image Processing | Vol 3, No 2 (2011) | Secure Image Transfer Using Chaos | Abstract |
R. Raja Kumar, A. Sampath, P. Indumathi | |||
Automation and Autonomous Systems | Vol 2, No 5 (2010) | Secure Image Transmission and Enhancing Digital Images Using Photopark-A Software Tool | Abstract |
K. Anuradha, V. Shrividhya | |||
Wireless Communication | Vol 6, No 9 (2014) | Secure Information Distribution in Cloud Computing | Abstract |
C. Leena, A. Daison Raj, M. BalaAnandď€ | |||
Wireless Communication | Vol 4, No 5 (2012) | Secure Key Distribution for Large and Dynamic Multicast Groups | Abstract |
G. Murali, G. Gurivi Reddy, Y. Srinivasulu, N. Priyanka | |||
Wireless Communication | Vol 4, No 12 (2012) | Secure Keying in Peer Network using Secret Sharing Technique | Abstract |
Y. M. Rajashri, D. K. Nayana | |||
Software Engineering | Vol 7, No 2 (2015) | Secure kNN Query Processing in Untrusted Cloud Environments | Abstract |
Devidas S. Thosar, Rajashree D. Thosar, Prashant J. Gadakh | |||
ICTACT Journal on Communication Technology | Vol 9, No 1 (2018) | Secure Localization Using Coordinated Gradient Descent Technique for Underwater Wireless Sensor Networks | Abstract |
V. Baranidharan, Kiruthiga Varadharajan | |||
Networking and Communication Engineering | Vol 4, No 7 (2012) | Secure Low Cost FPGA-based AMI System using LTE Technology | Abstract |
M. M. Abutaleb, A. M. Allam | |||
International Journal of Advanced Networking and Applications | Vol 7, No 1 (2015) | Secure Management of Logs in Internet of Things | Abstract PDF |
Udit Gupta | |||
International Journal of Advanced Networking and Applications | Vol 8, No 6 (2017) | Secure Modern Healthcare System Based on Internet of Things and Secret Sharing of IoT Healthcare Data | Abstract PDF |
Aaditya Jain, Bhupendra Kumar Soni | |||
International Journal of Technology | Vol 2, No 1 (2012) | Secure Multi Cast Transmission | Abstract |
Anirudha Kumar Pandey, Sipi Dubey | |||
Networking and Communication Engineering | Vol 2, No 5 (2010) | Secure Multi Server Strong-Password Authentication Using Two Factor Approach (Image Password and Mobile) | Abstract |
R. Kanakasundara Rao | |||
Research Journal of Pharmacy and Technology | Vol 10, No 1 (2017) | Secure Multicast Communication using RSA and DNA Cryptography | Abstract |
S. Narendren, A. Manimaran, V. M. Chandrasekaran, B. Praba | |||
89201 - 89225 of 110868 Items | First Previous 3564 3565 3566 3567 3568 3569 3570 3571 3572 3573 Next Last |
Browse Title Index
Scroll