Browse Title Index


 
Issue Title
 
Vol 3, No 2 (2015) Application of Quaternion Numbers in Identification Scheme Abstract
Reza Alimoradi
 
Vol 5, No 2 (2017) Assessment of Cloud Computing Security Risks for E-Governance Infrastructure Abstract
Riktesh Srivastava
 
Vol 2, No 1 (2014) Clone Detection in Manet Using Routing Information Protocol Abstract
Sakthivel Munuswamy, Anand Joseph Daniel Chinnaiyan, Karnavel Kuppuswamy
 
Vol 6, No 2 (2018) Cloud Storage Assured Deletion: Considerations and Schemes Abstract
Richard Thames, Ayad Barsoum
 
Vol 4, No 1 (2016) Cognitive M2M:An Emerging Technique towards Internet of Things Abstract
Lincy M. George, K. R. Remesh Babu
 
Vol 2, No 1 (2014) Combining Bilateral Filtering and Fusion of Visual and IR Images Abstract
Shanmugasundaram Marappan
 
Vol 10, No 1 (2021) Combining Security and Safety Risk Management in Critical Infrastructure Abstract
Robert Kemp, Richard Smith
 
Vol 6, No 2 (2018) Cyber-Physical Systems and Humane Security Engineering Abstract
T. V. Gopal
 
Vol 4, No 1 (2016) Design, Implementation and Performance Analysis of a Distributed Key Encryption System Deployed within a Public Cloud Abstract
Erich Rice, Dennis Guster, Laura Lebentritt
 
Vol 3, No 1 (2015) Design of Optical Thin Film Filter for Sensor Network Abstract
Vahideh Khadem Hosseini, Mohammad Taghi Ahmadi
 
Vol 7, No 2 (2019) Detection and Elimination of the Selfish Node in Ad-Hoc Network Using Energy Credit Based System Abstract
Samara Mubeen, Syyed Johar
 
Vol 6, No 1 (2018) DNA Cryptography:New Field of Cryptography Abstract
Ginu Saju, M. P. Deepika
 
Vol 9, No 2 (2021) Effectiveness of Machine Learning Techniques in Phishing Detection Abstract
Vahid Shahrivari, Mohammad Izadi, Mohammad Mahdi Darabi
 
Vol 8, No 1&2 (2020) Efficient Email Classification Approach Based on Semantic Methods Abstract
Alisha Afreen Shaik
 
Vol 3, No 1 (2015) Efficient Security for Data Communication in Wireless Sensor Networks Using Raspberry PI Abstract
Shruti V. Jadhav, Ajay Acharya
 
Vol 7, No 1 (2019) Energy Efficient Secure Routing Framework Based on Multidimensional Trust Evaluation for MANET Abstract
Renu, Sanjeev Sharma
 
Vol 2, No 1 (2014) Enhanced Caeser Cipher to Exclude Repetition and Withstand Frequency Cryptanalysis Abstract
Abdulkadir H. Disina, Zahraddeen A. Pindar, Sapiee Bin Hj. Jamel
 
Vol 1, No 1 (2013) Experimental Based Performance Analysis of IEEE 802.11/g Hybrid Network Abstract
Atul M. Gosai, Uditnarayan Kar, Bhargavi H Goswami
 
Vol 2, No 2 (2014) Extraction of Protein Sequence Motif Information using PSO K-Means Abstract
R. Gowri, R. Rathipriya
 
Vol 10, No 1 (2021) Fill the Gap to Connect Dot, the Cyber Intelligence Abstract
Vinit Thakur
 
Vol 3, No 1 (2015) Fully Homomorphic Encryption with Matrix Based Public Key Crypto Systems Abstract
Addepalli V. N. Krishna, Addepalli Hari Narayana, Kokk Madhura Vani
 
Vol 9, No 1 (2021) GenC - Student Concession Card Generator Abstract   PDF
Jagannath Bhat, Abhijith P., Jose Maliyakal, Manish T. I.
 
Vol 9, No 1 (2021) High Speed Public Key Encryption using Hyperboloid for Work from Home Abstract   PDF
Kunal Gagneja
 
Vol 4, No 2 (2016) Hybrid Cryptosystem Using Cellular Automata Transformations on Graphs Abstract
M. Phani Krishna Kishore, Sunayana Budhiraju
 
Vol 5, No 1 (2017) Inflammation Detection in Cervical Cytology Images Abstract
K. V. Sheena, K. V. Sikha
 
26 - 50 of 93 Items First Previous 1 2 3 4 Next Last