Table of Contents
Vol 7, No S4 (2014)
Articles
Security for an Image Using Bit-slice Rotation Method-image Encryption | ||
R. Vijayaraghavan, S. Sathya, N. R. Raajan | ||
DOI:10.17485/ijst/2014/v7iS4/54081 , Vol 7, No S4 (2014), Pagination: 1-7 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 259 | PDF Views: 0 |
Multi Level Encryption and Decryption Tool for Secure Administrator Login over the Network | ||
Delson Therambath Rajanbabu, Chaithanya Raj | ||
DOI:10.17485/ijst/2014/v7iS4/54082 , Vol 7, No S4 (2014), Pagination: 8-14 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 272 | PDF Views: 0 |
Countermeasure against Side Channel Power Attacks in Cryptography Devices | ||
K. P. Sridhar, S. Saravanan, R. Vijay Sai | ||
DOI:10.17485/ijst/2014/v7iS4/54083 , Vol 7, No S4 (2014), Pagination: 15-20 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 244 | PDF Views: 0 |
Energy Efficient Target Coverage in Sensor Networks | ||
D. Priyashree, B. Baranidharan, B. Shanthi | ||
DOI:10.17485/ijst/2014/v7iS4/54084 , Vol 7, No S4 (2014), Pagination: 21-23 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 264 | PDF Views: 0 |
Image and Video Error Rate Analysis in Full Duplex Communication Using Phase Offset | ||
B. Pon Pragadesh Kumar, N. R. Raajan, S. Karthik | ||
DOI:10.17485/ijst/2014/v7iS4/54085 , Vol 7, No S4 (2014), Pagination: 24-27 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 256 | PDF Views: 0 |
Optimal Hamming Distance Model for Crypto Cores against Side Channel Threats | ||
K. P. Sridhar, D. Muralidharan | ||
DOI:10.17485/ijst/2014/v7iS4/54086 , Vol 7, No S4 (2014), Pagination: 28-33 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 280 | PDF Views: 0 |
Pipelined Quadratic Equation Based Novel Multiplication Method for Cryptographic Applications | ||
B. Vignesh | ||
DOI:10.17485/ijst/2014/v7iS4/54087 , Vol 7, No S4 (2014), Pagination: 34-39 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 253 | PDF Views: 0 |
Spectrum Sensing Using Energy Detection Technique for Cognitive Radio Networks Using PCA Technique | ||
R. Sindhubargavi, M. Yuvasrri Sindhu, R. Saravanan | ||
DOI:10.17485/ijst/2014/v7iS4/54088 , Vol 7, No S4 (2014), Pagination: 40-45 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 256 | PDF Views: 0 |
Securing the Femtocells: Anonymity and Location Privacy | ||
Marc del Valle, B. Manikandan, V. S. Shankar Sriram | ||
DOI:10.17485/ijst/2014/v7iS4/54089 , Vol 7, No S4 (2014), Pagination: 46-51 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 248 | PDF Views: 0 |
Flip Flop and Double Substitution Based Textual Encryption | ||
D. Shrivishwanath, N. R. Raajan, L. Gopinath | ||
DOI:10.17485/ijst/2014/v7iS4/54090 , Vol 7, No S4 (2014), Pagination: 52-55 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 265 | PDF Views: 0 |
Authentication Service in Hadoop Using one Time Pad | ||
Nivethitha Somu, A. Gangaa, V. S. Shankar Sriram | ||
DOI:10.17485/ijst/2014/v7iS4/54091 , Vol 7, No S4 (2014), Pagination: 56-62 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 261 | PDF Views: 0 |
Partial Reconfigurable Implementation of IEEE802.11g OFDM | ||
S. Sivanantham, R. Adarsh, S. Bhargav, K. Jagannadha Naidu | ||
DOI:10.17485/ijst/2014/v7iS4/54092 , Vol 7, No S4 (2014), Pagination: 63-70 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 248 | PDF Views: 0 |