Issue | Title | |
Vol 3, No 2 (2015) | Application of Quaternion Numbers in Identification Scheme | Abstract |
Reza Alimoradi | ||
Vol 5, No 2 (2017) | Assessment of Cloud Computing Security Risks for E-Governance Infrastructure | Abstract |
Riktesh Srivastava | ||
Vol 2, No 1 (2014) | Clone Detection in Manet Using Routing Information Protocol | Abstract |
Sakthivel Munuswamy, Anand Joseph Daniel Chinnaiyan, Karnavel Kuppuswamy | ||
Vol 6, No 2 (2018) | Cloud Storage Assured Deletion: Considerations and Schemes | Abstract |
Richard Thames, Ayad Barsoum | ||
Vol 4, No 1 (2016) | Cognitive M2M:An Emerging Technique towards Internet of Things | Abstract |
Lincy M. George, K. R. Remesh Babu | ||
Vol 2, No 1 (2014) | Combining Bilateral Filtering and Fusion of Visual and IR Images | Abstract |
Shanmugasundaram Marappan | ||
Vol 10, No 1 (2021) | Combining Security and Safety Risk Management in Critical Infrastructure | Abstract |
Robert Kemp, Richard Smith | ||
Vol 6, No 2 (2018) | Cyber-Physical Systems and Humane Security Engineering | Abstract |
T. V. Gopal | ||
Vol 4, No 1 (2016) | Design, Implementation and Performance Analysis of a Distributed Key Encryption System Deployed within a Public Cloud | Abstract |
Erich Rice, Dennis Guster, Laura Lebentritt | ||
Vol 3, No 1 (2015) | Design of Optical Thin Film Filter for Sensor Network | Abstract |
Vahideh Khadem Hosseini, Mohammad Taghi Ahmadi | ||
Vol 7, No 2 (2019) | Detection and Elimination of the Selfish Node in Ad-Hoc Network Using Energy Credit Based System | Abstract |
Samara Mubeen, Syyed Johar | ||
Vol 6, No 1 (2018) | DNA Cryptography:New Field of Cryptography | Abstract |
Ginu Saju, M. P. Deepika | ||
Vol 9, No 2 (2021) | Effectiveness of Machine Learning Techniques in Phishing Detection | Abstract |
Vahid Shahrivari, Mohammad Izadi, Mohammad Mahdi Darabi | ||
Vol 8, No 1&2 (2020) | Efficient Email Classification Approach Based on Semantic Methods | Abstract |
Alisha Afreen Shaik | ||
Vol 3, No 1 (2015) | Efficient Security for Data Communication in Wireless Sensor Networks Using Raspberry PI | Abstract |
Shruti V. Jadhav, Ajay Acharya | ||
Vol 7, No 1 (2019) | Energy Efficient Secure Routing Framework Based on Multidimensional Trust Evaluation for MANET | Abstract |
Renu, Sanjeev Sharma | ||
Vol 2, No 1 (2014) | Enhanced Caeser Cipher to Exclude Repetition and Withstand Frequency Cryptanalysis | Abstract |
Abdulkadir H. Disina, Zahraddeen A. Pindar, Sapiee Bin Hj. Jamel | ||
Vol 1, No 1 (2013) | Experimental Based Performance Analysis of IEEE 802.11/g Hybrid Network | Abstract |
Atul M. Gosai, Uditnarayan Kar, Bhargavi H Goswami | ||
Vol 2, No 2 (2014) | Extraction of Protein Sequence Motif Information using PSO K-Means | Abstract |
R. Gowri, R. Rathipriya | ||
Vol 10, No 1 (2021) | Fill the Gap to Connect Dot, the Cyber Intelligence | Abstract |
Vinit Thakur | ||
Vol 3, No 1 (2015) | Fully Homomorphic Encryption with Matrix Based Public Key Crypto Systems | Abstract |
Addepalli V. N. Krishna, Addepalli Hari Narayana, Kokk Madhura Vani | ||
Vol 9, No 1 (2021) | GenC - Student Concession Card Generator | Abstract PDF |
Jagannath Bhat, Abhijith P., Jose Maliyakal, Manish T. I. | ||
Vol 9, No 1 (2021) | High Speed Public Key Encryption using Hyperboloid for Work from Home | Abstract PDF |
Kunal Gagneja | ||
Vol 4, No 2 (2016) | Hybrid Cryptosystem Using Cellular Automata Transformations on Graphs | Abstract |
M. Phani Krishna Kishore, Sunayana Budhiraju | ||
Vol 5, No 1 (2017) | Inflammation Detection in Cervical Cytology Images | Abstract |
K. V. Sheena, K. V. Sikha | ||
26 - 50 of 93 Items | First Previous 1 2 3 4 Next Last |
Browse Title Index
Scroll