Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "information security"

ADD TO MY LIST
 
SECURITY ISSUES IN COMPUTER NETWORK ARCHITECTURE

Author(s): Dr. M. Lilly Florence
STATISTICAL BIOMETRIC METHODS

Author(s): Sushma Jaiswal
Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis

Author(s): Pavan Kumar Gupta | Naveen Hemrajani | Savita Shiwani | Ruchi Davey
Achievements of Nursing Portal Development in Selected Countries

Author(s): Reza Safdari | Mashaallah Torabi | Mohammad Ali Cheraghi | Niloufar Masoori | Zahra Azadmanjir
Security Enhancement in Dynamic Telecast Routing

Author(s): Dr. GVN Prasad | M.Senthilkumar
Smart Card Security; Technology and Adoption

Author(s): Hamed Taherdoost | Shamsul Sahibuddin | Neda Jalaliyoon
PENGGUNAAN TEKNOLOGI INTERNET DALAM BISNIS

Author(s): Oviliani Yuliana
BENTUK PASAR EFISIENSI DAN PENGUJIANNYA

Author(s): Tatang Ary Gumanti | Elok Sri Utami
Building Climate Resilience in the Blue Nile/Abay Highlands: A Role for Earth System Sciences

Author(s): Benjamin F. Zaitchik | Belay Simane | Shahid Habib | Martha C. Anderson | Mutlu Ozdogan | Jeremy D. Foltz
Analysis and Design of Affine and Hill Cipher

Author(s): Mozhgan Mokhtari | Hassan Naraghi
A CONFIGURABLE SECURED IMAGE ENCRYPTION TECHNIQUE USING 3D ARRAY BLOCK ROTATION

Author(s): G. Lokeshwari | Dr. S. Udaya Kumar | G. Aparna
CRYPTOGRAPHIC PROTOCOLS USING ELLIPTIC CURVE OVER FINITE FIELDS

Author(s): D. SRAVANA KUMAR | CH. SUNEETHA | A.CHANDRASEKHAR
MAC based Approaches for Multicast Source Authentication

Author(s): Ramanpreet Kaur | Amrit Lal Sangal | Krishan Kumar
Wireless Sensor Network Safety Study

Author(s): M.Shankar | Dr.M.Sridar | Dr.M.Rajani
Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna

Author(s): Valery Korzhik | Viktor Yakovlev | Yuri Kovajkin | Guillermo Morales-Luna
Integrated Device Control System using Google Maps

Author(s): Takahiro KOITA | Kenta UEDA | Kenya SATO
Personal Authentication System using Hand Vein Biometric

Author(s): G. Sathish | Dr. S.V. Saravanan | Dr. S. Narmadha | Dr. S. Uma Maheswari
A P2P Approach for Efficient Certificate Revocation in MANET

Author(s): Suresh Babu Tumula | K.R.R.Mohana Rao
Protection through Oblivion 'An Image Based Steganography'

Author(s): T Chandra Sekhara Reddy | D Prasad | B.Venkateswara Reddy
Mobille Business, Quo Vadis?

Author(s): Robert Hudec | Peter Ciganek
High Security Image Steganography with Modified Arnold's Cat Map

Author(s): Minati Mishra | Ashanta Ranjan Routray | Sunit Kumar
A Study on Dynamic Data Masking with its Trends and Implications

Author(s): Ravi kumar G K | Dr B Justus Rabi | Manjunath TN
Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network

Author(s): Andrea Caiti | Vincenzo Calabrò | Gianluca Dini | Angelica Lo Duca | Andrea Munafò
Review Of Syn-Flooding Attack Detection Mechanism

Author(s): Mehdi Ebady Manna | Angela Amphawan
Cyber Threats In Social Networking Websites

Author(s): Wajeb Ghari | Maha Shaabi
Bluetooth Security Threats And Solutions: A Survey

Author(s): Nateq Be-Nazir Ibn Minar | Mohammed Tarique
A Novel Security Framework Using Trust And Fuzzy Logic In Manet

Author(s): Manoj V | Mohammed Aaqib | Raghavendiran N | Vijayan R
Encryption Of Data Using Elliptic Curve Over Finite Fields

Author(s): D. Sravana Kumar | CH. Suneetha | A. ChandrasekhAR
Performance Evaluation of Wi-Fi comparison with WiMAX Networks

Author(s): M.Sreerama Murty | D.Veeraiah | A.Srinivas Rao
IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots

Author(s): K.Munivara Prasad | A.Rama Mohan Reddy | V Jyothsna
Protected Data Objects Replication in Data Grid

Author(s): G. Aruna Kranthi | D. Shashi Rekha
Risks and Remedies in E-Learning System

Author(s): Nikhilesh Barik | Sunil Karforma
The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum Copying Machine

Author(s): Besma Othmani | Mohsen Machhout | Houcine Mejri | Hafedh Belmabrouk | Rached Tourki
Assessing water reservoirs management and development in Northern Vietnam

Author(s): A. Castelletti | F. Pianosi | X. Quach | R. Soncini-Sessa
ASurvey of causes of occupational accidents at working place under protection of Yazd Social Security Organization in 2005

Author(s): GhH. Halvani | H. Fallah | A. Barkhordari | R. Khoshk Daman | M. Behjati | F. Koohi
An Efficient Method of Steganography using Matrix Approach

Author(s): Nirmalya Chowdhury | Puspita Manna
Using Virtual Security Lab in Teaching Cryptography

Author(s): Salma M. Gaffer | Daniyal M. Alghazzawi
LSB Replacement Stegnography in an Image using Pseudorandomised Key Generation

Author(s): B. Karthikeyan | V. Vaithiyanathan | B. Thamotharan | M. Gomathymeenakshi | S. Sruti
Random Image Steganography and Steganalysis: Present Status and Future Directions

Author(s): Rengarajan Amirtharajan | Jiaohua Qin | John Bosco Balaguru Rayappan
Inverted Pattern in Inverted Time Domain for Icon Steganography

Author(s): Rengarajan Amirtharajan | John Bosco Balaguru Rayappan
Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA

Author(s): Sundararaman Rajagopalan | Rengarajan Amirtharajan | Har Narayan Upadhyay | John Bosco Balaguru Rayappan
Efficient Hand off using Fuzzy and Simulated Annealing

Author(s): Vikas.M.N | Keshava.K.N | Prabhas.R.K | Hameem Shanavas.I
CSRF Vulnerabilities and Defensive Techniques

Author(s): Rupali D. Kombade | B.B. Meshram
Enhancing Hash Function Selection Techniques Based on Message Contents

Author(s): Ali Saeed | Muhammad Khalil Shahid
Application of Erlang Formulae in Next Generation Networks

Author(s): Erik Chromy | Tibor Misuth | Adam Weber
A Hybrid Approach for Security Enhancement by Compressed Crypto-Stegno Scheme

Author(s): G. Manikandan | N. Sairam | M. Kamarasan
Evolution of Home Automation Technology

Author(s): Mohd. Rihan | M. Salim Beg
AN ALGORITHM FOR DIGITAL WATERMARKING OF STILL IMAGES FOR COPYRIGHT PROTECTION

Author(s): Jahnvi Sen | A.M. Sen | K. Hemachandran
A Comparative Study of Software Requirements Tools For Secure Software Development

Author(s): Mohammad Ubaidullah Bokhari | Shams Tabrez Siddiqui
Hash Security for Ad hoc Routing

Author(s): Ashwani Kush | C. Hwang
Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages

Author(s): Mallikka Rajalingam | Saleh Ali Alomari | Putra Sumari
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System

Author(s): Razi Hosseinkhani | H. Haj Seyyed Javadi
Semantic Massage Addressing based on Social Cloud Actor's Interests

Author(s): Reem M. Bahgat | Akram I. Salah | Hamada I. Abdul Wakeil
Audio Steganography Coding Using the Discrete Wavelet Transforms

Author(s): Siwar Rekik | Driss Guerchi | Habib Hamam | Sid-Ahmed Selouani
Quality and Distortion Evaluation of Audio Signal by Spectrum

Author(s): Er. Niranjan Singh | Dr. Bhupendra Verma
TRACKING OF INTRUDERS ON GEOGRAPHICAL MAP USING IDS ALERT

Author(s): Manish Kumar | M. Hanumanthappa | T.V. Suresh Kumar
Evaluation of Electrocardiogram for Biometric Authentication

Author(s): S K Singh | Yogendra Narain Singh
Safety Aspects in the Distance Learning Systems

Author(s): Alexander Zyma | Yousef Daradkeh | Sergii Kavun
Safety Aspects in the Distance Learning Systems

Author(s): Alexander Zyma | Yousef Daradkeh | Sergii Kavun
Perceived access to mental health services in three municipalities of Antioquia, 2004-2006

Author(s): Silvia Henao H | Vilma Restrepo R | Andrés F. Alzate R | Carlos M. González P
Segment Based Visual Cryptography For Key Distribution

Author(s): Sesha Pallavi Indrakanti | Avadhani P S
Digital Signatura Schemes for Secure Video

Author(s): R. N. Mandavgane | N.G.Bawane
A Survey on Cross Layer Security

Author(s): Sandeep Sharma | Rajesh Mishra | Karan Singh
Split Personality Malware: A Security Threat

Author(s): Nisha Lalwani | M.B.Chandak | R.V.Dharaskar
Trust Model for Reliable File Exchange In Cloud Computing

Author(s): Edna Dias Canedo | Rafael Timoteo de Sousa Junior | Robson de Oliveira Albuquerque
Generic Network Intrusion Prevention System

Author(s): Kamini Nalavade | B.B.Meshram
Antiphishing Model with URL & Image based Webpage Matching

Author(s): Madhuri S. Arade | P.C. Bhaskar | R.K.Kamat
Mathematical Model for Digital Video Watermarking Based On 3D Wavelet Transform

Author(s): Sonam A. Bhandari | Amar D. Rana | Swati Z. Bhandari
Image Stenography Skin Tone Detection

Author(s): DEEPALI BHAMARE | VIKAS GUPTA | P.B.SALUNKHE
Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS

Author(s): Prasad Patil | Rinku Shah | Kajal Jewani
Antiphishing Model with URL & Image based Webpage Matching

Author(s): Madhuri S. Arade | P.C. Bhaskar | R.K.Kamat
Secured and Authenticated Sharing of Software Program

Author(s): Madhavi Gangurde | Umashankar prasad | Ranvir Kumar | Prashant Prajapati
Analyzing Digital Signature Robustness with Message Digest Algorithms

Author(s): Rubina B. Patel | Naveen Chaudhary
Privacy-Preserving Data Sharing Using Data Reconstruction Based Approach

Author(s): Kshitij Pathak | Narendra S. Chaudhari | Aruna Tiwari
Realization & Implementation of Wireless Parking System with GSM Based Security

Author(s): Meenakshi Tripathi | M. S. Gaur | Vijay Laxmi
A Study of Role Based Access Control policies and Constraints

Author(s): Miriyala Markandeyulu | Bussa V.R.R.Nagarjuna | Akula Ratna Babu | A.S.K.Ratnam
Save time & money - Smart Internet Solutions     

Tango Jona
Tangokurs Rapperswil-Jona