Issue | Title | |
Vol 7, No 6 (2015) | Secure Socket Layer and its Security Analysis | Abstract |
Deepika Bansal, Priya Sethi, Shipra Kataria | ||
Vol 10, No 6 (2018) | Secure User Input Privacy in Website at A Large Scale | Abstract |
V. Vedhavalli, J. Kalaivani | ||
Vol 8, No 6 (2016) | Secured Cloud Based Healthcare System for Transformation Infrastructure | Abstract |
P. Anbumani, N.M. Abroja | ||
Vol 4, No 14 (2012) | Secured Data Transmission by Blowfish Algorithm using OFDM | Abstract |
T.S. Murugesh, B. Balraj | ||
Vol 4, No 14 (2012) | Secured Multipath Routing Protocol for Black Hole Attacks based on Secret Sharing in MANETs | Abstract |
C. Chandrasekar, S. Padmavathy | ||
Vol 5, No 1 (2013) | Secured Routing Protocol based on Secret Sharing in Voice Systems | Abstract |
C. Chandrasekar, S. Padmavathy | ||
Vol 7, No 4 (2015) | Securing API Using API Gateway | Abstract |
Arpita Gangrade, Bhawna Nigam | ||
Vol 8, No 5 (2016) | Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography | Abstract |
K. Saranya, P. Kavitha | ||
Vol 5, No 4 (2013) | Securing Information using Cryptography and Steganography Technique | Abstract |
V. Hemanth, Mahammad Shareef | ||
Vol 4, No 2 (2012) | Securing IP Address to Control IP Spoofing | Abstract |
Rainey C. Lal, Mridu Sahu | ||
Vol 1, No 4 (2009) | Securing Web Services through WS-Security in SOAP Protocol | Abstract |
N. Sasikala devi, Dr. L. Arockiam | ||
Vol 1, No 4 (2009) | Securing WLAN Using Reconfigurable YAGI Antenna | Abstract |
P. Muthu kannan, V. Palanisamy, R. Swaminathan | ||
Vol 3, No 14 (2011) | Security Analysis in Graphical Password Schemes | Abstract |
S. Yamini | ||
Vol 4, No 14 (2012) | Security and Analysis for Batch Transparency and Dynamic Storage in Cloud Computing | Abstract |
R. Gnanajeyaraman, A.S. Deepumon, Vishnuthulasidharan Vishnuthulasidharan | ||
Vol 10, No 8 (2018) | Security and Privacy Issues in Cloud Computing | Abstract |
R. Pooja, G. Sasikala | ||
Vol 2, No 9 (2010) | Security Enhancement of Multimedia System by Means of Novel Multiple Huffman Tables Approach | Abstract |
P. Raveendra Babu, V. Praveen Kumar, M. Samuel John, J. Ranga Rao | ||
Vol 10, No 4 (2018) | Security for Image Processing uses AES in MANET | Abstract |
N. M. Abroja, K. Shaheena Banu, R. Ambikapathy | ||
Vol 3, No 1 (2011) | Security for Web Applications Using Wiretap Library | Abstract |
Vanitha Akinapalli, A. Sanjeeva Raju, Shylaja Akinapally, K. Madhavi | ||
Vol 5, No 9 (2013) | Security in Mobile Grid Systems: A Review | Abstract |
Grantej Otari, Vijay Ghorpadeb | ||
Vol 6, No 1 (2014) | Security in VoIP | Abstract |
Elsayed M. Elshamy, Osama S. Faragalla, Sayed El-Rabaie, Osama Elshakankiry, Fathi Sayed | ||
Vol 3, No 9 (2011) | Security Issues and Milestones in Cloud Infrastructure | Abstract |
S. Subbiah, T. Sowkarthika | ||
Vol 1, No 7 (2009) | Security Issues for Hand-Held Devices in the New Era of Mobile Computing | Abstract |
Dr. Ravindra Patel, Vishnu Sharma, Ratnesh Litoriya | ||
Vol 10, No 10 (2018) | Security Issues in Wireless Sensor Network and Healthcare Related Applications | Abstract |
P. Anushree, N.G. Harish Kumar, Dr. S. Sarathambekai | ||
Vol 4, No 5 (2012) | Security Issues Using Multi Clouds | Abstract |
R. Kavitha | ||
Vol 11, No 3 (2019) | Security System Using Steganopin | Abstract |
M. Preethirani, K. K. Vaishnavi, D. Monisha rajakumari, L. Gowri, E. Madura | ||
826 - 850 of 963 Items | << < 29 30 31 32 33 34 35 36 37 38 > >> |
ISSN: 0974 – 9616