Issue Title
Vol 4, No 1b Authentication Based Cloud Storage and Secure Data Forwarding Abstract  PDF
Rajasekaran S, Kalifulla. Y, Murugesan. S, Ezhilvendan. M, Gunasekaran. J
Vol 6, No 3 Privacy Preserving Data Mining using Attribute Encryption and Data Perturbation Abstract  PDF
Meenakshi Vishnoi, Seeja K. R
Vol 12, No 8 A Secure key Distribution and Management Scheme for Home Area Network in Smart Grid Abstract  PDF
Halim Halimi, Aristotel Tentov
Vol 9, No 1 Image Steganography combined with Cryptography Abstract  PDF
Vijaya Lakshmi Paruchuri, Dr.R. Sridevi, K.S. SadaSiva Rao
Vol 11, No 10 Prevention Techniques for Sybil Attack Abstract  PDF
Roopali Garg, Himika Sharma
Dilip Kumar Kotthapalli, Dr. V.R. Anitha
Vol 13, No 1 Developing and Evaluation of New Hybrid Encryption Algorithms Abstract  PDF
DiaaSalama AbdElminaam, Hatem M. Abdul Kader, Mohie M. Hadhoud, Salah M El-Sayed
Vol 6, No 2 Secured Data Transmission Using Wavelet Based Steganography And Cryptography Abstract  PDF
Mittapalli Indrasena Reddy, V. Uday Kumar, K. Subba Reddy, P. Venkat Vijay Kumar
Vol 14, No 12 Design and Implementation of RSA Algorithm using FPGA Abstract  PDF
Ari Shawkat Tahir
Vol 7, No 1 Enhanced Tiny Encryption Algorithm with Embedding (ETEA) Abstract  PDF
Dr. Deepali Virmani, Nidhi Beniwal, Gargi Mandal, Saloni Talwar
Vol 15, No 8 A Review of Digital Signature Using Different Elliptic Cryptography Technique Abstract  PDF
Anurag Singh Bhadoria, Anurag Jain
Vol 7, No 1 Enhancing RSA algorithm using Mersenne Primes with reduced size of encrypted file Abstract  PDF
Shilpa Madhaorao Pund, Chitra G Desai
Vol 9, No 3 Comparative Study of DES, 3DES, AES and RSA Abstract  PDF
Amritpal Singh, Mohit Marwaha, Baljinder Singh, Sandeep Singh
Vol 12, No 2 SIAVA: Secret Information Aggregation Design for Various Applications in Wireless Sensor Networks Abstract  PDF
M. Ezhilvendan, T. Kavitha, S. Chinnadurai, P. Kumaran
Vol 12, No 4 Problems of Modern Networks Abstract  PDF
Mohammad Al- Rababah, Nour E. Oweis, Khaled Sadeq Al-shredei
Vol 10, No 7 Application of Steganography in Symmetric Key Cryptography with Genetic Algorithm Abstract  PDF
Samir K Bandyopadhyay, Sabyasachi Pramanik
1 - 16 of 16 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"