Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Secure Data Communication"

ADD TO MY LIST
 
Information System with Interlacing, key dependent Permutation and rotation

Author(s): Prasad Reddy. P.V.G.D, K.R.Sudha, P Sanyasi Naidu
An Approach to Secure Data with Authentication & Integrity using EHDES over Noisy Channel

Author(s): Ramveer Singh | Sanjive Tyagi | Awakash Mishra | Akshay Tyagi | Deo Brat Ojha
Hybridization of advance technologies in the field of WLAN

Author(s): Sujata Khobragade | Snehalata Barde | Rasmiprava Singh
A Secure Cluster-Based Multipath Routing Protocol for WMSNs

Author(s): Islam T. Almalkawi | Manel Guerrero Zapata | Jamal N. Al-Karaki
Sensor Based Framework for Secure Multimedia Communication in VANET

Author(s): Aneel Rahim | Zeeshan.Shafi Khan | Fahad T. Bin Muhaya | Muhammad Sher | Tai-Hoon Kim
Performance Analysis of IP Security VPN

Author(s): Ritu Malik | Rupali Syal
ENCRYPTION OF DATA STREAMS USING PAULI SPINS ½ MATRICES

Author(s): D. Sravana Kurmar | CH. Suneetha, | A. Chandra Sekhar
SPACE-AGE APPROACH TO TRANSMIT MEDICAL IMAGE WITH CODEBASE CRYPTOSYSTEM OVER NOISY CHANNEL

Author(s): DEO BRAT OJHA, | , AJAY SHARMA, | ABHISHEK DWIVEDI | NITIN PANDEY, | AMIT KUMAR
Effective Rekeying Architecture for Dynamic Multicast Group

Author(s): V. Vijayaraghavan | R.S.D. Wahidabanu
Improving Fault Tolerance in Ad-Hoc Networks by Using Residue Number System

Author(s): A. Barati | M. Dehghan | A. Movaghar | H. Barati
Spiking Neurons With ASNN Based-Methods for the Neural Block Cipher

Author(s): Saleh Ali K. Al-Omari | Putra Sumari
Study Of Multimedia Watermarking Techniques

Author(s): Chhaya S. Gosavi | C. S. Warnekar
Reducing e-commerce risks using digital certificates

Author(s): Piščević Miloš | Simić Dejan
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks

Author(s): Emmanouil A. Panaousis | George Drew | Grant P. Millar | Tipu A. Ramrekha | Christos Politis
Emergency Response Communications and Associated Security Challenges

Author(s): Muhammad Ibrahim Channa | Kazi M. Ahmed
Securing MMS with High Performance Elliptic Curve Cryptography

Author(s): B. N. Jagdale | R.K.Bedi | Sharmishta Desai
A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment

Author(s): M. Sudha | Dr.Bandaru Rama Krishna Rao | M. Monica
A Solution of Secure User-to-SP Messaging Using Identity-Based Cryptography

Author(s): Yu Dingguo | Chen Nan | Tan Chengxiang
Quantum Teleportation circuit using Matlab and Mathematica

Author(s): Ms.Swati Sharma, | Prof Asok De | Prof S.N Kulkarni, | Prof Asok De | Prof S.N Kulkarni
A NEW DATA TRANSFER SCHEME BASED ON BANDWIDTH ALLOCATION FOR VIRTUAL PRIVATE NETWORKS

Author(s): Mahalakshmi C | Ramaswamy M | Alamelu Nachiappan
A Modified Location-Dependent Image Encryption for Mobile Information System

Author(s): Prasad Reddy.P.V.G.D | K.R.Sudha | P Sanyasi Naidu
An Investigation into Encrypted Message Hiding Through Images Using LSB

Author(s): FAHIM IRFAN ALAM | FATEHA KHANAM BAPPEE, | FARID UDDIN AHMED KHONDKER
Enhancing the Communication Channel Through Secure Shell And Irrational DES

Author(s): S.R.M.Krishna, | Paradeep singh jamwal, | K.padma priya | P.Hema Vishnu
ESAC Based Channel Aware Routing Using Route Handoff

Author(s): Dr. V.Kavitha, | S.Balaji
Secure Data aggregation in Wireless Sensor Network: A Survey

Author(s): Mukesh Kumar Jha, | T.P. Sharma
A Novel Energy Efficient Mechanism for Secured Routing of Wireless Sensor Network

Author(s): Anupriya Sharma | Paramjeet Rawat | Suraj Malik | Sudhanshu Gupta
Steganography Based on Payload Transformation

Author(s): K B Shiva Kumar | K B Raja | R K Chhotaray | Sabyasachi Pattnaik
Secure Measures for the Vulnerabilities in MAODV

Author(s): P. Bharathi | A. Amuthan
A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security

Author(s): K. Venkata Ramana, | Dr.B.Raveendra Babu, | Sri Ch.Ratna Babu
On-board Unit and its Possibilities of Communications on Safety and Security Principles

Author(s): Martin Vaculik | Maria Franekova | Peter Vestenicky | Martin Vestenicky
Design and Development of a Flexible Reliable Smart Gas Detection System

Author(s): Dipanjan Bhattacharjee | Purva Bhatnagar | Sushabhan Choudhury
DNA Computing based Elliptic Curve Cryptography

Author(s): P. Vijayakumar | V. Vijayalakshmi | G. Zayaraz
PENGGUNAAN TEKNOLOGI INTERNET DALAM BISNIS

Author(s): Oviliani Yuliana
Application Based Detection Technique for Secure Mobile Ad-hoc Network

Author(s): Kamini Maheshwar | Sapna Bagde | Deshraj Ahirwar
Black Hole Detection in MANET Using AODV Routing Protocol

Author(s): Govind Sharma | Manish Gupta
On-board Unit and its Possibilities of Communications on Safety and Security Principles

Author(s): Martin Vaculik | Maria Franekova | Peter Vestenicky | Martin Vestenicky
Enhancing Security Measures by Tunnelling Protocol in Distributed Grid Network

Author(s): T. Mohan Raj | S. Shahul Hammed | Amala Deepan
A Novel Security Framework Using Trust And Fuzzy Logic In Manet

Author(s): Manoj V | Mohammed Aaqib | Raghavendiran N | Vijayan R
A Security Suite for Wireless Body Area Networks

Author(s): Raghav V. Sampangi | Saurabh Dey | Shalini R. Urs | Srinivas Sampalli
Inverted Pattern in Inverted Time Domain for Icon Steganography

Author(s): Rengarajan Amirtharajan | John Bosco Balaguru Rayappan
SECURED TREE BASED KEY MANAGEMENT IN WIRELESS BROADCAST SERVICES

Author(s): K.Vijaya Babu | O. Srinivasa Rao | Dr. MHM Krishna Prasad
Image Stenography Skin Tone Detection

Author(s): DEEPALI BHAMARE | VIKAS GUPTA | P.B.SALUNKHE
Analyzing Digital Signature Robustness with Message Digest Algorithms

Author(s): Rubina B. Patel | Naveen Chaudhary
Establishing Security for Group Communication in Multicast Environment

Author(s): B.V.S.S.R.S.Sastry | K.Akshitha | M.V.Vijaya Saradhi
Performance Evaluation of Secure Video Transmission over WIMAX

Author(s): FarrukhEhtisham | Emmanouil A. Panaousis | Christos Politis
Role of Multiple Encryption in Secure Electronic Transaction

Author(s): Himanshu Gupta | Vinod Kumar Sharma
Dynamic Routing with Security Considerations

Author(s): G. Murali | D. Pavan | V.V. Rajesh Reddy | P. Bharath kumar
A Secured Chat System With Authentication Technique As RSA Digital Signature

Author(s): Oyinloye O.Elohor | Ogemuno Emamuzo | Akinbohun Folake | Ayodeji .I. Fasiku
A DSP Based POD Implementation for High Speed Multimedia Communications

Author(s): Zhang Chang Nian | Li Hua | Zhang Nuannuan | Xie Jiesheng
Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources

Author(s): Dittmann Jana | Steinebach Martin | Wohlmacher Petra | Ackermann Ralf
On the Design of Error-Correcting Ciphers

Author(s): Mathur Chetan Nanjunda | Narayan Karthik | Subbalakshmi KP
Secure Network Coding against Wiretapping and Byzantine Attacks

Author(s): Guo Qin | Luo Mingxing | Li Lixiang | Yang Yixian
Secure and Efficient Data Transmission over Body Sensor and Wireless Networks

Author(s): Challa Narasimha | Çam Hasan | Sikri Madhur
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION

Author(s): Shaik Rasool | G. Sridhar | K. Hemanth Kumar | P. Ravi Kumar
Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing

Author(s): Jian Yang | Haihang Wang | Jian Wang | Chengxiang Tan | Dingguo Yu
Guest Editorial

Author(s): Masato Oguchi | Hyung-Jin Choi | Tae-Jin Lee | Seong Keun Oh | Kwan-Ho You
Enhancing Performance of Optical Communication Systems with Advanced Optical Signal Processing

Author(s): Ivan Glesk | Marc Sorel | Anthony E Kelly | Paul R Prucnal
Guest Editorial

Author(s): Hsing-Chung Chen | Franz I.S. Ko | Yung-Chen Chou | Shyan-Ming Yuan | Yaw-Chung Chen | Chin-Chen Chang | Jyh-Horng Wen | Shiuh-Jeng Wang | Yuh-Ren Tsai | Keh-Ming Lu
Guest Editorial

Author(s): Jean-Henry Morin | Shiguo Lian | Xin Wang | David Llewellyn-Jones
The Future-Oriented Grid-Smart Grid

Author(s): Qilin Li | Mingtian Zhou
Privacy Preserving Aggregate Query of OLAP for Accurate Answers

Author(s): Youwen Zhu | Liusheng Huang | Wei Yang | Fan Dong
Stego on 2n:1 Platform for Users and Embedding

Author(s): M. Padmaa | Y. Venkataramani | Rengarajan Amirtharajan
A New and Secure Cryptosystem for Image Encryption and Decryption

Author(s): Rao K | Kumar K | Murali Krishna P
IMPLEMENTATION OF NODE ENERGY BASED ON ENCRYPTION KEYING

Author(s): Dr.S.Bhargavi | Ranjitha B.T
INFORMATION HIDING USING AUDIO STEGANOGRAPHY – A SURVEY

Author(s): Jayaram P | Ranganatha H R | Anupama H S
Data Security using Quantum Cryptography

Author(s): Dr. Garima Dhingra | Sunil Maggu | Meenu Dhingra
Enhanced Fast and Secure Hybrid Encryption Algorithm for Message Communication

Author(s): Shaik Rasool | Md Ateeq ur Rahman | G. Sridhar | K. Hemanth Kunar
An Efficient Stream Cipher Algorithm for Data Encryption

Author(s): Majid Bakhtiari | Mohd Aizaini Maarof
SYNCHRONIC DISTANCE EDUCATION FROM THE PERSPECTIVE OF A HANDICAPPED PERSON

Author(s): Hasan KARAL | Ayca CEBI | Yigit Emrah TURGUT
From the Editor

Author(s): Ugur Demiray
Virtual Energy-Efficient Encryption and Keying (VEEEK) for Wireless Sensor Networks

Author(s): K. Ravi Chythanya | S.P.Anandaraj. | S. Padmaja
Minimized Overhead and Administrator based Secure Routing Protocol

Author(s): Himadri Nath Saha | Debika Bhattacharyya | P. K.Banerjee
Security Apprehensions In Different Regions Of Cloud Captious Grounds

Author(s): Gurdev Singh | Amit Sharma | Manpreet Singh Lehal
Single Core Hardware Module to Implement Partial Encryption of Compressed Image

Author(s): Mamun B.I. Reaz | M. S. Amin | Fazida H. Hashim | K Asaduzzaman
Integration of Quantum Cryptography through Satellite Networks Transmission

Author(s): Skander Aris | Abderraouf Messai | Malek Benslama | Merabtine Nadjim | Mosleh M-Elharti
Cryptographic Algorithms for Secure Data Communication

Author(s): Zirra Peter Buba | Gregory Maksha Wajiga
Implementation of Secure Cross-site Communication on QIIIEP

Author(s): Dilip Kumar Sharma | Ashok Kumar Sharma
Concept of Privacy protection in Data Mining

Author(s): Vikram Singh | Dr. P.K. Yadav
Secure File Multi Transfer Protocol Design

Author(s): Murali Krishna | Pradeep Jamwal | K. S. R. Chaitanya | B. Vinod Kumar
Any Resource Sharing via HWN* Routing

Author(s): Chong SHEN | Susan REA | Dirk PESCH
All-Optical Cryptographic Device for Secure Communication

Author(s): Fabio Garzia | Roberto Cusani
Design and Simulation of a Secure and Robust Underwater Acoustic Communication System in the Persian Gulf

Author(s): Abdollah Doosti Aref | Mohammad Javad Jannati | Vahid Tabataba Vakili
On Error Estimation in Runge-Kutta Methods

Author(s): Ochoche ABRAHAM | Gbolahan BOLARIN
Reducing False Alerts Using Intelligent Hybrid Systems

Author(s): Sravan Kumar Jonnalagadda | Subha Sree Mallela
Post-Disaster Image Processing for Damage Analysis Using GENESI-DR, WPS and Grid Computing

Author(s): Conrad Bielski | Simone Gentilini | Marco Pappalardo
An Excellent Image Data Hiding Algorithm Based on BTC

Author(s): Nur Mohammad | Xingming Sun | Hengfu Yang
Securing Information in PeertoPeer Environment

Author(s): Velvizhi N | D. Manjula
Towards An XML-Based Normalization for Healthcare Data Exchanges

Author(s): I. E. Azami | M. M.O. Cherkaoui | C. Tahon
Affiliate Program      Why do you need a reservation system?