|
Issue |
Title |
|
Vol 5, No 15 (2018): Vol-05-Issue-15-May-2018 |
Securing Student Data Using Protection Methods for Analysis |
Abstract
PDF
|
Prashanth Vemula |
|
Vol 5, No 12 (2018): Vol-05-Issue-12-April-2018 |
Securitisation in India |
Abstract
PDF
|
Maninder Kaur Walia |
|
Vol 4, No 17 (2017): Vol-04-Issue-17-December-2017 |
Security Analysis of Location Based Geo-Social Application |
Abstract
PDF
|
S.V.S. Padmini, V. Naresh |
|
Vol 6, No 7 (2019): Vol-6-Issue-7-June-2019 |
Security and Communication New Routing for Contrasting Wireless Sensor Networks |
Abstract
PDF
|
SK.Mastan Biwas, D. Kumar |
|
Vol 3, No 9 (2016): Vol-3_Issue-9_May_2016 |
Security and Dependable Detection of Packet Proceed Attacks in Mobile Ad Hoc Networks |
Abstract
PDF
|
N. Koteswara Rao, CH.D. Sunil kumar |
|
Vol 3, No 17 (2016): Vol-3_Issue-17_November_2016 |
Security and DependableEquivalent Service Using Fuzzy Identity-Based Encryption |
Abstract
PDF
|
Ambati Saikumar, Mandalapu Ekambaram Naidu |
|
Vol 3, No 11 (2016): Vol-3_Issue-11_July_2016 |
Security and Privacy for Networked Medical Devices |
Abstract
PDF
|
Kaushik P, Guru R |
|
Vol 3, No 17 (2016): Vol-3_Issue-17_November_2016 |
Security and Privacy in Multimedia Content in Cloud Computing |
Abstract
PDF
|
Mysagalla Mahesg, Adavelli Ramesh, Machukonda Kishore |
|
Vol 6, No 7 (2019): Vol-6-Issue-7-June-2019 |
Security and Resolution Control of Image Upload on Online Social Networks |
Abstract
PDF
|
B Kiran Babu, Dr.P.Pedda Sadhu Naik |
|
Vol 5, No 12 (2018): Vol-05-Issue-12-April-2018 |
Security and Trust Management in Cloud Computing |
Abstract
PDF
|
Somanaboina. Rajeswari, Mallereddy. Sowjanya Reddy |
|
Vol 2, No 7 (2015): VOL-2_ISSUE-07_JULY_2015 |
Security Authentication through a Near-Field Communication in Asymmetric Cryptography |
Abstract
PDF
|
S Tanveer Ahammad, B. Balasubbanna |
|
Vol 4, No 8 (2017): Vol-04_Issue-08_July_2017 |
Security Based Embedded Transition Inversion Code for Information Interchange |
Abstract
PDF
|
Talari Srinivas, R Uma Susila |
|
Vol 2, No 9 (2015): VOL-2_ISSUE-09_September_2015 |
Security based Optimizing Design to Migrate Cloud |
Abstract
PDF
|
Pokuru Guruteja, Jayendra Kumar |
|
Vol 3, No 18 (2016): Vol-3_Issue-18_December_2016 |
Security Based Optimizing Design To Migrate Cloud |
Abstract
PDF
|
N. Poojitha, Mrs. T.Neetha |
|
Vol 5, No 4 (2018): Vol-05-Issue-04-February-2018 |
Security Challenges and Threats in Cloud Computing Systems |
Abstract
PDF
|
G. Radha Devi |
|
Vol 5, No 12 (2018): Vol-05-Issue-12-April-2018 |
Security Challenges in Mobile Computing – A State of Art Survey |
Abstract
PDF
|
S. Chohitha, Shirina Samreen, G. Vishnu Murthy |
|
Vol 3, No 17 (2016): Vol-3_Issue-17_November_2016 |
Security Challenges of India: Perspectives and Prospects |
Abstract
PDF
|
Usha Dahiya |
|
Vol 1, No 4 (2014): Vol-1_Issue-4_May_2014 |
Security Challenges to India-Bangladesh Relations: Some Visible Issues |
Abstract
PDF
|
Zahoor Ahmad Rather |
|
Vol 6, No 7 (2019): Vol-6-Issue-7-June-2019 |
Security Characterization and Expression in Data Publishing Using Selection Algorithm |
Abstract
PDF
|
Tippireddy Indraja, G. Anantha Rao |
|
Vol 5, No 7 (2018): Vol-05-Issue-07-March-2018 |
Security Enhancement on Cloud Using Advanced Identity Based Encryption (Aibe) |
Abstract
PDF
|
B. Swathi, A.Madan Gopal, P.Durga Vinod |
|
Vol 3, No 01 (2016): Vol-3_Issue-1_January_2016 |
Security Evaluation of Pattern Classifiers under Attack |
Abstract
PDF
|
M V Vidyadhari, K Kiranmai, K Rama Krishniah, D Sarath Babu |
|
Vol 3, No 01 (2016): Vol-3_Issue-1_January_2016 |
Security Fundamentals in Internet of Things |
Abstract
PDF
|
A. M. Chandrashekhar, Chaitra K. V., Sandhya Koti |
|
Vol 5, No 12 (2018): Vol-05-Issue-12-April-2018 |
Security Implementation For Digital Image Watermarking |
Abstract
PDF
|
Anu Shokeen, Gaurav Gautam |
|
Vol 1, No 9 (2014): Vol-1_Issue-9_October_2014 |
Security in Java Features That Differentiates Java from Other Languages |
Abstract
PDF
|
Kajal Kanika, Monika Malhotra |
|
Vol 4, No 17 (2017): Vol-04-Issue-17-December-2017 |
Security Intensification for Mobile Ad Hoc Networks with Reliable Management Using Uncertain Reasoning |
Abstract
PDF
|
Gorati aruna, Srihari Rao |
|
12901 - 12925 of 15699 Items |
<< < 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 > >> |