Search


 
Issue Title
 
Vol 3, No 2b Issues and Emerging Trends in Identity Management Abstract  PDF
Manish Snehi, Jyoti Snehi, Renu Dhir
 
Vol 4, No 2b1 Security Test by using F T M and Data Allocation Strategies on Leakage Detection Abstract  PDF
Pallavali Radha, G. Sireesha
 
Vol 4, No 2b1 Web Client and Web Server approaches to Prevent XSS Attacks Abstract  PDF
Jyoti Snehi, Dr. Renu Dhir
 
Vol 3, No 2c Security Issues of Routing Protocols in MANETs Abstract  PDF
Kaushal Gandhi, Rajneesh Narula, Sumeer Khullar, Anish Arora
 
Vol 14, No 6 ENHANCED SECURITY MECHANISM IN CLOUD COMPUTING: A REVIEW Abstract  PDF
Gagandeep Kaur, Dr. Mohita Garg, Mrs. Navjot Jyoti
 
Vol 7, No 1 Enhancing RSA algorithm using Mersenne Primes with reduced size of encrypted file Abstract  PDF
Shilpa Madhaorao Pund, Chitra G Desai
 
Vol 14, No 7 Enhancing Cloud Computing Security by Using Pixel Key Pattern Abstract  PDF
Randeep Kaur, Jagroop Kaur
 
Vol 11, No 2 Study of Vulnerability Diagnosis and Sustaining Integrity of the Embedded Devices Abstract  PDF
Masaki Fujikawa
 
Vol 14, No 11 Security of Web Services: Methods and Contrivance Abstract  PDF
Malinka Ivanova
 
Vol 14, No 8 ENHANCED SECURITY MECHANISM IN CLOUD COMPUTING USING HYBRID ENCRYPTION ALGORITHM AND FRAGMENTATION: A REVIEW Abstract  PDF
Amandeep Kaur, Mr. Pawan Luthra
 
Vol 8, No 2 Challenges and Security Issues in Future IT Infrastructure Components Abstract  PDF
Syed Mubashir Ali
 
Vol 14, No 9 HYBRID MODEL OF RSA, AES AND BLOWFISH TO ENHANCE CLOUD SECURITY Abstract  PDF
Jasleen Kaur, Sachin Bagga
 
Vol 10, No 1 Information Security Awareness Behavior : A Conceptual Model for Cloud Abstract  PDF
Sasan Karamizadeh, Jafar Shayan, Mojtaba Alizadeh, Atabak Kheirkhah
 
Vol 12, No 8 Mitigating Packet Classification for Header Information Retrieval in Wireless Network Abstract  PDF
LEKSHMI MR, Prof.N. Nityanandam
 
Vol 5, No 3 Review of Acknowledgment Based Techniques for Detection of Black Hole/Gray Hole Attacks in MANETs Abstract  PDF
Rajveer Kaur, Dr. Shaveta Rani, Dr. Paramjeet Singh
 
Vol 14, No 4 Formal Methods in Information Security Abstract  PDF
AJAYI ADEBOWALE, NICULAE GOGA, OTUSILE OLUWABUKOLA, ABEL SAMUEL
 
Vol 14, No 11 A Review of Security Threats by The Unauthorized in The E-Learning Abstract  PDF
Mohamed Munser Saleh
 
Vol 5, No 1 Privacy and Security Issues In Mobile Social Networking and in Modern Shopping Experience Abstract  PDF
Sanjeev Kulkarni, Kirna Kumari, Naheeda Kittur
 
Vol 13, No 1 Developing and Evaluation of New Hybrid Encryption Algorithms Abstract  PDF
DiaaSalama AbdElminaam, Hatem M. Abdul Kader, Mohie M. Hadhoud, Salah M El-Sayed
 
Vol 5, No 3 An Overview Of Virtualization Abstract  PDF
Er.Gursimran Singh, Er.Gurjit Singh Bhathal
 
Vol 14, No 6 Demand of Wireless Network and Security in Current Research Abstract  PDF
Abhishek Prabhakar, Amod Tiwari, Vinay Kumar Pathak
 
Vol 14, No 12 A NOVEL APPROACH OF HYBRID MODEL OF ENCRYPTION ALGORITHMS AND FRAGMENTATION TO ENSURE CLOUD SECURITY Abstract  PDF
Amandeep Kaur, Mr. Pawan Luthra
 
Vol 5, No 1 VIABLE NETWORK INTRUSION DETECTION ON WIRELESS ADHOC NETWORKS Abstract  PDF
Nutakki Praveena, Dr. Ujwal A. Lanjewar, Chilakalapudi Meher Babu
 
Vol 6, No 2 Survey paper on intrusion detection techniques Abstract  PDF
Rachna Kulhare, Dr. Divakar Singh
 
Vol 14, No 6 ADVANCED FILE BASED SECURITY MECHANISM IN CLOUD COMPUTING: A REVIEW Abstract  PDF
Nisha Nisha, Naseeb Singh
 
1 - 25 of 63 Items 1 2 3 > >> 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"