Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Cryptographic Techniques"

ADD TO MY LIST
 
Trust-based Routing Security in MANETS

Author(s): R.Balakrishna, | U.Rajeswar Rao | G.A.Ramachandra | M.S.Bhagyashekar
Analysis of Various Attacks over BB84 Quantum Key Distribution Protocol

Author(s): Rahul Aggarwal | Heeren Sharma | Deepak Gupta
Grid Signature: High Performance Digital Signature Through Using Alchemi Grid Computing.

Author(s): Iyad Ali Shaheen | Abdelfatah Hegazy | Bahaa Hasan
Secure Architecture for M-Learning Bluetooth Services

Author(s): Catalin BOJA | Lorena BATAGAN | Alin ZAMFIROIU
Efficient Cryptographic Key Generation using Biometrics

Author(s): T.Raghav Trivedi | Dr.R.Seshadri
A Security Algorithm for Iris Based Biometric System

Author(s): TARACHAND VERMA | PROF. RICHA JINDAL
Image Cipher Technique for Covert and Low Bandwidth Channels

Author(s): Sangeeta Solanki | A.K.Vats | Shikha Maan
Small Size Hashes with Enhanced Security

Author(s): Lars R Knudsen
Data Hiding: Current Status and Key Issues

Author(s): Nan-I Wu | Min-Shiang Hwang
Secure Source Routing Protocol for Mobile Adhoc Networks

Author(s): M.Rajesh Babu, Dr.S.Selvan
A Novel Encryption scheme based on Double Based Canonical Number System

Author(s): A.Chandra Sekhar | Ch.Suneetha | T.Surendra | S.Uma Devi
STEGANOGRAPHY: AN OVERVIEW

Author(s): JAMMI ASHOK, | Y.RAJU | S.MUNISHANKARAIAH, | K.SRINIVAS
A System of Umpires for Security of Wireless Mobile Ad Hoc Network

Author(s): Ayyaswamy Kathirvel | Rengaramanujam Srinivasan
A Robust and Secure Methodology for Network Communications

Author(s): Mayank Srivastava | Mohd. Qasim Rafiq | Rajesh Kumar Tiwari
Secure Authenticated and Key Agreement Protocols With Access Control for Mobile Environments

Author(s): Pierre E. ABI-CHAR | Abdallah M'HAMED | Bachar EL-HASSAN | Mounir MOKHTARI
SPM: Source Privacy for Mobile Ad Hoc Networks

Author(s): Jian Ren | Yun Li | Tongtong Li
DESIGN OF A NEW SECURITY PROTOCOL USING HYBRID CRYPTOGRAPHY ALGORITHMS

Author(s): Dr.S.Subasree and Dr.N.K.Sakthivel
A Review of Current Routing Attacks in Mobile Ad Hoc Networks

Author(s): Rashid Hafeez Khokhar | Md Asri Ngadi | Satria Mandala
Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications

Author(s): Giovanni Agosta | Luca Breveglieri | Gerardo Pelosi | Martino Sykora
Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem

Author(s): Andrew Byrne | Nicolas Meloni | Arnaud Tisserand | Emanuel M. Popovici | William Peter Marnane
Guest Editorial

Author(s): Uwe Brinkschulte | Marcello Cinque | Tony Givargis | Stefano Russo
Provable Secured Hash Password Authentication

Author(s): T.S.Thangavel | A. Krishnan
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENSOR NETWORK

Author(s): Mohammad Saiful Islam Mamun | A.F.M. Sultanul Kabir
A (2,N) Visual Cryptographic Technique for Banking Applications

Author(s): Jayanta Kumar Pal | J. K. Mandal | Kousik Dasgupta
A Secure Iris Image Encryption Technique Using Bio-Chaotic Algorithm

Author(s): Abdullah Sharaf Alghamdi, Hanif Ullah
Optimized FPGA Routing using Soft Computing

Author(s): Saveena | Vinay Chopra | Dr. Amardeep Singh
A Survey on Cryptography and Steganography Methods for Information Security

Author(s): Kallam Ravindra Babu | Dr. S.Udaya Kumar | Dr. A.Vinaya Babu
A Comparative study of Forward Secure Publickey Method Using HIBE and BTE

Author(s): G.Appa Rao | Srinivasan.Nagaraj, | B.Prakash | Dr.V.Valli Kumari, | Dr KVSVN Raju
A Novel Stegnosystem Design for Defying Differential Power Analysis Attacks on Smart Cards

Author(s): Hanan Mahmoud | Khaled Alghathbar | Alaaeldin Hafez
Improving Existing e-payment Systems by Implementing the Concept of Cancelable Biometrics

Author(s): Partha Pratim Ghosh | Sabyascahi Pattnaik, | Gunjan Verma
A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks

Author(s): K.P.Manikandan | Dr.R.Satyaprasad | Dr.K.Rajasekhararao
A Novel Approach for Cheating Prevention Through Visual Cryptographic Analysis

Author(s): Manjunath Gadiparthi | Sridurga Tangirala | Soumya Tatikonda | Swathi Adualla
Applying and Analyzing Security using Images : Steganography v.s. Steganalysis

Author(s): Nighat Mir | Asrar Qadi | Wissal Dandachi
Some methods for blindfolded record linkage

Author(s): Churches Tim | Christen Peter
A Secure and Robust Object-Based Video Authentication System

Author(s): Qi Tian | Qibin Sun | Dajun He
Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources

Author(s): Ralf Ackermann | Petra Wohlmacher | Martin Steinebach | Jana Dittmann
Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fields

Author(s): Ch. Suneetha | D. Sravana Kumar | A. Chandrasekhar | K. Vanitha
CRYPTOGRAPHIC PROTOCOLS USING ELLIPTIC CURVE OVER FINITE FIELDS

Author(s): D. SRAVANA KUMAR | CH. SUNEETHA | A.CHANDRASEKHAR
Design of Digital Signature Algorithm by Fractals and Chaos Theory

Author(s): Dr. G. Geetha | K. Thamizhchelvy
Visual cryptography for color images by dithering techniques

Author(s): Lakshmi Priya Tadiboyna | M. Deena Babu
Encryption Of Data Using Elliptic Curve Over Finite Fields

Author(s): D. Sravana Kumar | CH. Suneetha | A. ChandrasekhAR
A New Approach for Improving Data Security using Iterative Blowfish Algorithm

Author(s): G. Manikandan | N. Sairam | M. Kamarasan
A Hybrid Approach for Security Enhancement by Compressed Crypto-Stegno Scheme

Author(s): G. Manikandan | N. Sairam | M. Kamarasan
Digital Tampering Detection Techniques: A Review

Author(s): Kusam | Pawanesh Abrol | Devanand
Desing and Implementation of Distributed Security using Onion Routing

Author(s): Ashish T. Bhole | Savita H. Lambole
A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis

Author(s): Morampudi Naresh kumar | Datrika Srinivas Rao | D.Sravanthi
Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources

Author(s): Dittmann Jana | Steinebach Martin | Wohlmacher Petra | Ackermann Ralf
SPM: Source Privacy for Mobile Ad Hoc Networks

Author(s): Ren Jian | Li Yun | Li Tongtong
A Secure and Robust Object-Based Video Authentication System

Author(s): He Dajun | Sun Qibin | Tian Qi
Recovery based Time Synchronization for Wireless Networks

Author(s): Anita Kanavalli | P Deepa Shenoy | Venugopal K R | L M Patnaik
Guest Editorial

Author(s): Jean-Henry Morin | Shiguo Lian | Xin Wang | David Llewellyn-Jones
Data Security using Quantum Cryptography

Author(s): Dr. Garima Dhingra | Sunil Maggu | Meenu Dhingra
A New IRIS Normalization Process For Recognition System With Cryptographic Techniques

Author(s): S Nithyanandam | K S Gayathri | P L K Priyadarsini
A Survey about the Latest Trends and Research Issues of Cryptographic Elements

Author(s): Ijaz Ali Shoukat | Kamalrulnizam Abu Bakar | Mohsin Iftikhar
IMPLEMENTATION OF NEURAL - CRYPTOGRAPHIC SYSTEM USING FPGA

Author(s): KARAM M. Z. OTHMAN | MOHAMMED H. AL JAMMAS
Cryptovirology: Virus Approach

Author(s): Shivale Saurabh Anandrao
NEW ENCRYPTION METHOD BASED ON DOUBLE BASED CANONICAL NUMBER SYSTEM

Author(s): B.Krishna Gandhi | S.Sri Lakshmi
Formal Analysis of Quantum Systems using Process Calculus

Author(s): Timothy A.S. Davidson | Simon J. Gay | Rajagopal Nagarajan
IMPLEMENTATION OF OBJECT ORIENTED ENCRYPTION SYSTEM USING LAYERED CELLULAR AUTOMATA

Author(s): CHINTA SOMSWARA RAO | SRINIVASA RAO ATTADA | MADINA JAYANTHI RAO | KUNA NAGESWARA RAO
A Direct Trust dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP)

Author(s): Shaik Sahil Babu | Arnab Raha | Mrinal Kanti Naskar
A Comparative Analysis of Tools for Verification of Security Protocols

Author(s): Nitish Dalal | Jenny Shah | Khushboo Hisaria | Devesh Jinwala
An Improved Binary Method for Scalar Multiplication in Elliptic Curve Cryptography

Author(s): M. A. Mohamed | M. R.M. Said | K. A.M. Atan | Z. A. Zulkarnain
Save time & money - Smart Internet Solutions      Why do you need a reservation system?