Journal | Issue | Title | |
Research Cell: An International Journal of Engineering Sciences | Vol 22 (2016) | Secured ATM Transaction Using Fingerprint and Voice Recognition Interface | Abstract PDF |
Jaswinder Singh, Jaswinder Kaur | |||
Digital Signal Processing | Vol 12, No 2 (2020) | Secured Circuit Breaker Using Password | Abstract |
V. Anand Kumar, S. Ganesh Kumar, V. Karthikeyan, M. Jeevendran, E. Karthickraja | |||
Networking and Communication Engineering | Vol 8, No 6 (2016) | Secured Cloud Based Healthcare System for Transformation Infrastructure | Abstract |
P. Anbumani, N.M. Abroja | |||
Digital Image Processing | Vol 7, No 5 (2015) | Secured Color Image Compression and Efficient Reconstruction Using Arnold Transform with Chaos Encoding Technique | Abstract |
D. Venugopal, M. Gunasekaran, A. Sivanatharaja | |||
Biometrics and Bioinformatics | Vol 1, No 8 (2009) | Secured Cryptographic Key Generation from Multimodal Biometrics:Feature Level Fusion of Fingerprint and Iris | Abstract |
A. Jagadeesan, T. Thillaikkarasi, K. Duraiswamy | |||
Networking and Communication Engineering | Vol 4, No 14 (2012) | Secured Data Transmission by Blowfish Algorithm Using OFDM | Abstract |
T. S. Murugesh, B. Balraj | |||
International Journal of Advanced Networking and Applications | Vol 10, No 2 (2018) | Secured Dynamic Clustering using Light Weighted Key Authentication for Target Tracking | Abstract PDF |
D. Ramesh, G. S. Biradar | |||
Digital Image Processing | Vol 4, No 8 (2012) | Secured File Management System Using Stegnography | Abstract |
N. Suresh Singh, G. Suganthi, A. R. Sajeev Ambi, M. Sreelal | |||
Software Engineering | Vol 8, No 6 (2016) | Secured File Sharing in Cloud Computing | Abstract |
M. Deepak, C. Mathan Kumar, D. Suganya | |||
ICTACT Journal on Soft Computing | Vol 13, No 4 (2023) | Secured Financial Management System for Modern Digital Transactions Using Blockchain | Abstract |
K. Vijayakumar, Sameer Alani | |||
ICTACT Journal on Soft Computing | Vol 14, No 1 (2023) | Secured Financial Management System for Modern Digital Transactions Using Blockchain | Abstract |
K. Vijayakumar, Sameer Alani | |||
International Journal of Science, Engineering and Computer Technology | Vol 2, No 3 (2012) | Secured Hydraulic Braking System | Abstract |
Roopak Kumar | |||
Digital Image Processing | Vol 5, No 3 (2013) | Secured Image Compression Using Gradient Decent Based ANN Learning | Abstract |
M. B. Suresh, H. N. Veena | |||
Networking and Communication Engineering | Vol 4, No 14 (2012) | Secured Multipath Routing Protocol for Black Hole Attacks Based on Secret Sharing in MANETs | Abstract |
C. Chandrasekar, S. Padmavathy | |||
Artificial Intelligent Systems and Machine Learning | Vol 8, No 7 (2016) | Secured Multi-Purpose Smart Card Authentication Using RFID in Multi Cloud using Big Data | Abstract |
S. P. Audline Beena, A. Lydia Joyce | |||
Data Mining and Knowledge Engineering | Vol 5, No 2 (2013) | Secured New Generation CAPTCHA to Prevent BOTS and SPAMS | Abstract |
B. Suganya, R. Vaishnavi | |||
Wireless Communication | Vol 7, No 6 (2015) | Secured Personal Health Record in Cloud using Attribute based Encryption | Abstract |
S. Vijayalakshmi, S. Geetha | |||
International Journal of Advanced Networking and Applications | Vol 3, No 4 (2012) | Secured Reconfigurable Software Defined Radio Using OTA Software Download | Abstract PDF |
V. Jeyalakshmi, G. Vijayakumari | |||
International Journal of Advanced Networking and Applications | Vol 1, No 2 (2009) | Secured Rekeying in B-Tree and NSBHO Tree | Abstract PDF |
P. Ramesh Kumar, P. Srinivasulu | |||
Networking and Communication Engineering | Vol 5, No 1 (2013) | Secured Routing Protocol Based on Secret Sharing in Voice Systems | Abstract |
C. Chandrasekar, S. Padmavathy | |||
Wireless Communication | Vol 12, No 2 (2020) | Secured Source Location Privacy using Infrastructure Centric Method | Abstract |
D. Sindhu, A. Tamilarasan, M. Santhosh, D. Ragavi, M. Divyanand | |||
Digital Signal Processing | Vol 8, No 6 (2016) | Secured Transmission using Software Defined Radio Technique | Abstract |
L. Leona Shaibi, B. Jermi Aloshiya, V. Janani, M.R. Mahalakshmi | |||
AIRCC's International Journal of Computer Science and Information Technology | Vol 13, No 6 (2021) | Secureti: Advanced SDLC And Project Management Tool For TI (Philippines) | Abstract PDF |
Amelie Anne Gutierrez | |||
International Journal of Advanced Networking and Applications | Vol 15, No 6 (2024) | SecureZone: Secure and Efficient Multipath Routing for Mobile Ad Hoc Networks | Abstract |
Rani Sahu, Vinay Sahu, Pushplata Chouksey, Sourabh Jain | |||
ICTACT Journal on Communication Technology | Vol 15, No 1 (2024) | Securing and Advancing Road Safety in Intelligent Vehicular Networks for Seamless and Secure Communication | Abstract |
R. Saranya, A. Tamizhselvi, Piyush Charan, Syed Arfath Ahmed | |||
89251 - 89275 of 110868 Items | First Previous 3566 3567 3568 3569 3570 3571 3572 3573 3574 3575 Next Last |
Browse Title Index
Scroll