Journal | Issue | Title | |
Networking and Communication Engineering | Vol 3, No 11 (2011) | Secure Multicast Routing Protocol against Insider Attacks in MANET | Abstract |
V. Jayalakshmi, R. Rameshkumar | |||
International Journal of Computer Networks and Applications | Vol 8, No 2 (2021) | Secure Multi-Path Routing Using Splitting and Merging Based Clustering for Reducing Power Usage in MANET | Abstract PDF |
Krishnaveni Sakkarapani, C. Chandra Prabha | |||
Research Cell: An International Journal of Engineering Sciences | Vol 16, No 1 (2015) | Secure Node Localization in Wireless Sensor Network: A Review | Abstract PDF |
Simarjeet Kaur, Navdeep Kaur, Kamaljit Singh | |||
International Journal of Advanced Networking and Applications | Vol 11, No 5 (2020) | Secure Online Electronic Civil Registration Using Cloud Computing: A Conceptual Framework | Abstract PDF |
Ojo Olanrewaju, Akinade Abigail Oluwatoyin, O. Tokunbo-cole Mary | |||
International Journal of Computer Networks and Applications | Vol 10, No 6 (2023) | Secure Power Aware Hybrid Routing Strategy for Large-Scale Wireless Sensor Networks | Abstract PDF |
Mohammad Sirajuddin, B. Sateesh Kumar | |||
Networking and Communication Engineering | Vol 8, No 5 (2016) | Secure Preserving Public Auditing for Regenerating Code based on Cloud Storage | Abstract |
S. Nalini Poornima, R. S. Ponmagal | |||
Networking and Communication Engineering | Vol 6, No 2 (2014) | Secure Probabilistic Location Verification for Wireless Sensor Networks | Abstract |
R. Vidhyalakshmi, G. Surya | |||
International Journal of Knowledge Based Computer System | Vol 5, No 2 (2017) | Secure Ranked Keyword Search Over Encrypted Cloud Data | Abstract |
K. Mariyammal, A. Padmapriya | |||
International Journal of Distributed and Cloud Computing | Vol 4, No 2 (2016) | Secure, Reliable and High Performance Multicloud Storage | Abstract |
R. Santhosh, J. Pradeep | |||
International Journal of Science, Engineering and Computer Technology | Vol 4, No 1-2 (2014) | Secure Routing Algorithms For Wireless Sensor Networks | Abstract |
Sunil Moun | |||
International Journal of Knowledge Based Computer System | Vol 4, No 2 (2016) | Secure Satellite Image Communication Using DCT, DWT, Median Filter and RSA | Abstract |
Ekta Chauhan | |||
Digital Image Processing | Vol 4, No 11 (2012) | Secure Semi Blind Image Watermarking Using Fractional Fourier and Wavelet Transforms | Abstract |
Ehab H. Elshazly, Mahmoud A. Ashour, El-Sayed M. El-Rabaie, Alaaeldin M. Abbas, Fathi E. Abd El-Samie, H. B. Kazemian | |||
ICTACT Journal on Communication Technology | Vol 6, No 1 (2015) | Secure Service Discovery Based on Probe Packet Mechanism for Manets | Abstract |
S. Pariselvam, G. Madhubala, R. M. S. Parvathi | |||
Networking and Communication Engineering | Vol 7, No 6 (2015) | Secure Socket Layer and its Security Analysis | Abstract |
Deepika Bansal, Priya Sethi, Shipra Kataria | |||
International Journal of Computer Networks and Applications | Vol 10, No 1 (2023) | Secure Storage and Data Sharing Scheme Using Private Blockchain-Based HDFS Data Storage for Cloud Computing | Abstract PDF |
Gaurav Shrivastava, Sachin Patel | |||
Biometrics and Bioinformatics | Vol 8, No 7 (2016) | Secure Transaction on ATM Using OTP, FingerPrint and Reverse Pin Model | Abstract |
C.P. Jetlin, S.H. Shalma Shain, R. Srija, P. Sri Priyanka | |||
ICTACT Journal on Communication Technology | Vol 9, No 3 (2018) | Secure Transmission of Bio-Medical Data Using Steganography | Abstract |
S. Thenmozhi, P. Sureka, Ramgopal Segu | |||
ICTACT Journal on Image and Video Processing | Vol 10, No 1 (2019) | Secure Transmission of Data using Image Steganography | Abstract |
Sourabh Chandra, Smita Paira | |||
Networking and Communication Engineering | Vol 10, No 6 (2018) | Secure User Input Privacy in Website at A Large Scale | Abstract |
V. Vedhavalli, J. Kalaivani | |||
ICTACT Journal on Image and Video Processing | Vol 6, No 1 (2015) | Secure Visual Secret Sharing Based on Discrete Wavelet Transform | Abstract |
S. Jyothi Lekshmi, A. R. Anil | |||
Automation and Autonomous Systems | Vol 5, No 5 (2013) | Secure Voter Verifiable Audit Trail | Abstract |
Srivatsan Sridharan | |||
Oriental Journal of Computer Science and Technology | Vol 4, No 1 (2011) | Secure Watermarking Technique for Emerging Clouds | Abstract PDF |
R. Vinoth, S. Sivasankar | |||
Journal of Network and Information Security | Vol 3, No 2 (2015) | Secure Watermarking using Diophantine Equations for Authentication and Recovery | Abstract |
Jayashree Nair, T. Padma | |||
Journal of Engineering Education Transformations | Vol 36, No SP (2022) | Secure Web Application : Rudimentary Perspective | Abstract |
IPS Sethi, Sanjay Kumar Sinha, Neeta Chauhan, Deepti Khanduja | |||
International Journal of Advanced Networking and Applications | Vol 8, No 6 (2017) | SECURE:An Ameliorated SQL Semiotic for Security | Abstract PDF |
Ajeet A. Chikkamannur, Shivanand M. Handigund | |||
89226 - 89250 of 110868 Items | First Previous 3565 3566 3567 3568 3569 3570 3571 3572 3573 3574 Next Last |
Browse Title Index
Scroll