Journal | Issue | Title | |
Indian Journal of Finance | Vol 6, No 8 (2012) | Securities Transaction Tax Reduction and Stock-Futures Arbitrage in India: A Case Study | Abstract |
Ronald T. Slivka, Pankaj Aggarwal, Raghvendra Sisodia | |||
Journal of Intellectual Property Rights | Vol 27, No 2 (2022) | Securitization of Intellectual Property: Legal Recourse in India | Abstract |
Ahmar Afaq, Rupal Chhaya | |||
Indian Journal of Finance | Vol 1, No 2 (2007) | Securitization: The Concept and Its Relevance to Indian Banks | Abstract |
Dharmendra Singh, Garima Kohli Malik | |||
Wireless Communication | Vol 8, No 6 (2016) | Security against Jamming in Opportunistic Localization for Underwater Sensor Networks | Abstract |
Dr. P. Vijayalakshmi, S.B. Saritha | |||
Networking and Communication Engineering | Vol 3, No 14 (2011) | Security Analysis in Graphical Password Schemes | Abstract |
S. Yamini | |||
Biometrics and Bioinformatics | Vol 2, No 3 (2010) | Security Analysis of Multimodal Biometric Fuzzy Vault | Abstract |
V. S. Meenakshi, G. Padmavathi | |||
Biometrics and Bioinformatics | Vol 1, No 1 (2009) | Security Analysis of Multimodal Biometric Fuzzy Vault | Abstract |
V. S. Meenakshi, G. Padmavathi | |||
Wireless Communication | Vol 5, No 2 (2013) | Security Analysis of Secure Routing Protocols over MANET | Abstract |
Pradnya R. Patange, S. P. Medhane | |||
Software Engineering | Vol 8, No 6 (2016) | Security Analysis on Privacy Data Encryption in Many Order Using Magic Number | Abstract |
S. Srilekha | |||
Networking and Communication Engineering | Vol 4, No 14 (2012) | Security and Analysis for Batch Transparency and Dynamic Storage in Cloud Computing | Abstract |
R. Gnanajeyaraman, A. S. Deepumon, Vishnuthulasidharan | |||
International Journal of Computer Networks and Applications | Vol 2, No 4 (2015) | Security and Fraud Issues of E-Banking | Abstract PDF |
Emad Abu-Shanab, Salam Matalqa | |||
IAHRW International Journal of Social Sciences Review | Vol 5, No 1 (2017) | Security and Insecurity of Women in Changing Family Structure:Indian Perception | Abstract |
M. R. Banahatti, Netravati Barker, Rashmi Appannavar | |||
ICTACT Journal on Communication Technology | Vol 13, No 4 (2022) | Security and Privacy Concerns of Internet of Things (IOT) in the Cloud | Abstract |
M. R. Sheeba, G. Suganthi, R. Jemila Rose | |||
Fuzzy Systems | Vol 5, No 7 (2013) | Security and Privacy in Wired and Wireless Networks, Hybrid, Sensor and Adhoc Networks | Abstract |
M. Bala Humsika, M. Deepthi | |||
Software Engineering | Vol 5, No 12 (2013) | Security and Privacy in Wired, Wireless, Mobile, Hybrid, Sensor and Ad Hoc Networks | Abstract |
M. Faizee Nisha, R. M. Nivedhidha, K. Arul Marie Joycee | |||
Networking and Communication Engineering | Vol 10, No 8 (2018) | Security and Privacy Issues in Cloud Computing | Abstract |
R. Pooja, G. Sasikala | |||
Wireless Communication | Vol 6, No 2 (2014) | Security and Trust Based Model for Peer To Peer System | Abstract |
S. Saranya | |||
Journal of Network and Information Security | Vol 2, No 2 (2014) | Security Architecture for Telemetry Networks | Abstract |
Farzad Moazzami, Richard Dean | |||
Wireless Communication | Vol 4, No 1 (2012) | Security Aspects in Wireless Sensor Network | Abstract |
Pratibhadevi Tapashetti, A. S. Umesh, Ashalatha Kulshrestha | |||
Digital Image Processing | Vol 7, No 8 (2015) | Security Based Speaker Verification for Lip-Password using Learning Multi-Boosted HMMS | Abstract |
A. Jebaselvi, Kumar Parasuraman, T. Arumuga Maria Devi | |||
Biometrics and Bioinformatics | Vol 3, No 5 (2011) | Security by E-Fabricating System | Abstract |
Bhupathiraju Venkataramaraju, Narayanasamy Rajendran | |||
International Journal of Computer Networks and Applications | Vol 9, No 1 (2022) | Security Challenges and Related Solutions in Software Defined Networks: A Survey | Abstract PDF |
Konda Srikar Goud, Srinivasa Rao Gidituri | |||
International Journal of Computer Networks and Applications | Vol 2, No 2 (2015) | Security Concerns at Various Levels of Cloud Computing Paradigm: A Review | Abstract PDF |
Aarti Singh, Manisha Malhotra | |||
International Journal of Distributed and Cloud Computing | Vol 1, No 2 (2013) | Security Enhanced Multi Level Authentication for Cloud | Abstract |
Vishal Vijay Saswade, S. M. Bansode | |||
International Journal of Computer Networks and Applications | Vol 2, No 2 (2015) | Security Enhancement in Shoulder Surfing Attacks using Passpoints for Random Similar Images (PRSIm) | Abstract PDF |
A. Meiappane, V. Prasanna Venkataesan, V. Premanand | |||
89301 - 89325 of 110868 Items | First Previous 3568 3569 3570 3571 3572 3573 3574 3575 3576 3577 Next Last |
Browse Title Index
Scroll