Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "international security"

ADD TO MY LIST
 
A Novel Security Framework Using Trust And Fuzzy Logic In Manet

Author(s): Manoj V | Mohammed Aaqib | Raghavendiran N | Vijayan R
Encryption Of Data Using Elliptic Curve Over Finite Fields

Author(s): D. Sravana Kumar | CH. Suneetha | A. ChandrasekhAR
Performance Evaluation of Wi-Fi comparison with WiMAX Networks

Author(s): M.Sreerama Murty | D.Veeraiah | A.Srinivas Rao
Optimizing One Fair Document Exchange Protocol

Author(s): Abdullah M. Alaraj
IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots

Author(s): K.Munivara Prasad | A.Rama Mohan Reddy | V Jyothsna
Protected Data Objects Replication in Data Grid

Author(s): G. Aruna Kranthi | D. Shashi Rekha
Efficient & Secure Data Hiding Using Secret Reference Matrix

Author(s): Laxman Tawade | Rajshree Mahajan | Chandan Kulthe
Risks and Remedies in E-Learning System

Author(s): Nikhilesh Barik | Sunil Karforma
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks

Author(s): Sridhar Subramanian | Baskaran Ramachandran
A Security Suite for Wireless Body Area Networks

Author(s): Raghav V. Sampangi | Saurabh Dey | Shalini R. Urs | Srinivas Sampalli
The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum Copying Machine

Author(s): Besma Othmani | Mohsen Machhout | Houcine Mejri | Hafedh Belmabrouk | Rached Tourki
A STUDY OF FERTILIZER POLICY IN INDIA

Author(s): TANPURE SAMBHAJI SHAMRAO
STANDARDIZING SOURCE CODE SECURITY AUDITS

Author(s): Suzanna Schmeelk | Bill Mills | Leif Hedstrom
A contemporary overview labour market of Kazakhstan

Author(s): Ayhan Gençler | Recep Seymen | Arif Akbaş
CANCELLABLE FACE BIOMETRICS USING IMAGE BLURRING

Author(s): HEMANTHA KUMAR G. and MANOJ KRISHNASWAMY
SECURING WMN USING HONEYPOT TECHNIQUE

Author(s): Priyanka Gupta | Paramjeet Rawat | Suraj Malik | Sudhanshu Gupta
An Efficient Method of Steganography using Matrix Approach

Author(s): Nirmalya Chowdhury | Puspita Manna
Using Virtual Security Lab in Teaching Cryptography

Author(s): Salma M. Gaffer | Daniyal M. Alghazzawi
Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques

Author(s): Sreenivasa Rao Basavala | Narendra Kumar | Alok Agarrwal
Policy, Perception and Health Care Utilization in Myanmar

Author(s): Soe Moe | Daw Khin Saw Naing
Efficient Hand off using Fuzzy and Simulated Annealing

Author(s): Vikas.M.N | Keshava.K.N | Prabhas.R.K | Hameem Shanavas.I
CSRF Vulnerabilities and Defensive Techniques

Author(s): Rupali D. Kombade | B.B. Meshram
Enhancing Hash Function Selection Techniques Based on Message Contents

Author(s): Ali Saeed | Muhammad Khalil Shahid
Application of Erlang Formulae in Next Generation Networks

Author(s): Erik Chromy | Tibor Misuth | Adam Weber
Evolution of Home Automation Technology

Author(s): Mohd. Rihan | M. Salim Beg
A Comparative Study of Software Requirements Tools For Secure Software Development

Author(s): Mohammad Ubaidullah Bokhari | Shams Tabrez Siddiqui
Appetite and falls: Old age and lived experiences

Author(s): Marianne Mahler | Anneli Sarvimäki
Hash Security for Ad hoc Routing

Author(s): Ashwani Kush | C. Hwang
Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages

Author(s): Mallikka Rajalingam | Saleh Ali Alomari | Putra Sumari
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System

Author(s): Razi Hosseinkhani | H. Haj Seyyed Javadi
Recourse Management Using a Fair Share Scheduler

Author(s): Suja Cherukullapurath Mana
Semantic Massage Addressing based on Social Cloud Actor's Interests

Author(s): Reem M. Bahgat | Akram I. Salah | Hamada I. Abdul Wakeil
A Micro-Mobility Management Scheme for Handover and Roaming

Author(s): Debabala Swain | Siba Prasada Panigrahi | Prasanta Kumar Patra
Audio Steganography Coding Using the Discrete Wavelet Transforms

Author(s): Siwar Rekik | Driss Guerchi | Habib Hamam | Sid-Ahmed Selouani
A LOCATION TRACER WITH SOCIAL NETWORKING SERVICES

Author(s): PRIYA A. KOTWAL | KAPIL JULWANI | SUNIL L. BANGARE | PALLAVI S. BANGARE
New Proposed Classic Cluster Layer Architecture for Mobile Adhoc Network (cclam)

Author(s): Kuldeep Sharma | Nikhil Khandelwal | Sanjeev Kumar Singh
UNAPPROVED ACCESS POINT ELIMINATION IN WLAN USING MULTIPLE AGENTS AND SKEW INTERVALS

Author(s): Prof.S.B.Vanjale | J.A.Dave | Prof.P.B.Mane
Quality and Distortion Evaluation of Audio Signal by Spectrum

Author(s): Er. Niranjan Singh | Dr. Bhupendra Verma
HWSW IMPLEMENTATION OF IRIS RECOGNITION ALGORITHM IN THE FPGA

Author(s): Hentati Raida | YassineAoudni | Mohamed Abid
TRACKING OF INTRUDERS ON GEOGRAPHICAL MAP USING IDS ALERT

Author(s): Manish Kumar | M. Hanumanthappa | T.V. Suresh Kumar
IMPLEMENTATION OF THE TRIPLE-DES BLOCK CIPHER USING VHDL

Author(s): Sai Praveen Venigalla | M. Nagesh Babu | Srinivas Boddu | G. Santhi Swaroop Vemana
Chemical cautery of the inferior turbinates with trichloroacetic acid

Author(s): Azevedo, Alexandre Fernandes de | Martins, Dário Antunes | Cardoso, Caroline Guimarães | Moraes, Itamar Fernando Cândido de | Michel, Luciane Maria Pereira | Leite, Laura Hora Rios
Socio-Economic Characteristics of HIV in a South African Prison

Author(s): Jeff Gow | Bligh Grant | Mark Colvin
Secure And Reliable Routing In Mobile Adhoc Networks

Author(s): Rachid Haboub | Mohammed Ouzzif
Segment Based Visual Cryptography For Key Distribution

Author(s): Sesha Pallavi Indrakanti | Avadhani P S
Digital Signatura Schemes for Secure Video

Author(s): R. N. Mandavgane | N.G.Bawane
A Survey on Cross Layer Security

Author(s): Sandeep Sharma | Rajesh Mishra | Karan Singh
Methodology for Human Face retrieval from video sequences based on holistic approach

Author(s): Z. G. Sheikh | V.M. Thakare | S. S. Sherekar
Security issues in Cloud Computing

Author(s): Kalyani D. Kadam | Sonia K. Gajre | R. L. Paikrao
Split Personality Malware: A Security Threat

Author(s): Nisha Lalwani | M.B.Chandak | R.V.Dharaskar
Trust Model for Reliable File Exchange In Cloud Computing

Author(s): Edna Dias Canedo | Rafael Timoteo de Sousa Junior | Robson de Oliveira Albuquerque
Generic Network Intrusion Prevention System

Author(s): Kamini Nalavade | B.B.Meshram
Antiphishing Model with URL & Image based Webpage Matching

Author(s): Madhuri S. Arade | P.C. Bhaskar | R.K.Kamat
Mathematical Model for Digital Video Watermarking Based On 3D Wavelet Transform

Author(s): Sonam A. Bhandari | Amar D. Rana | Swati Z. Bhandari
Real time Video Streaming using Novel approach

Author(s): Mukesh Kumar | Jain Akash | B.A.Khivsara | Magar Padmakar | Baphana Abliasaha
Efficient Face Detection using Adaboost

Author(s): K.T.Talele | Sunil Kadam | Atul Tikare
Image Stenography Skin Tone Detection

Author(s): DEEPALI BHAMARE | VIKAS GUPTA | P.B.SALUNKHE
Botnet-A Network Threat

Author(s): Sonal P.Patil | Swatantra Kumar
Artificial Intelligence with Stereo Vision Algorithms and its Methods

Author(s): Sahil S.Thakare | Rupesh P. Arbal | Makarand R. Shahade
Multimodal Biometric Feature based Person Classification

Author(s): Smita Thakre | Kalyani Mamulkar | Prachi Motghare | Pooja Godi | Ujwalla Gawande
A Novel Approach for Iris Encryption

Author(s): Shrinivasrao B. Kulkarni | Ravindra S. Hegadi | Umakant P. Kulkarni
Desing and Implementation of Distributed Security using Onion Routing

Author(s): Ashish T. Bhole | Savita H. Lambole
Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS

Author(s): Prasad Patil | Rinku Shah | Kajal Jewani
Antiphishing Model with URL & Image based Webpage Matching

Author(s): Madhuri S. Arade | P.C. Bhaskar | R.K.Kamat
Data Integrity and Confidentiality in Outsourced Database

Author(s): Sonal Balpande | Rajashree Shegde | Lata Ragha
New Improved Methodology for Pedestrian Detection in Advanced Driver Assistance System

Author(s): Vijay Gaikwad | Shashikant Lokhande | Sanket Manthan
Secured and Authenticated Sharing of Software Program

Author(s): Madhavi Gangurde | Umashankar prasad | Ranvir Kumar | Prashant Prajapati
Security Enhancement Algorithms for Data Transmission for Next Generation Networks

Author(s): Vikas Kaul | S K Narayankhedkar | S Achrekar | S Agarwal
Undergraduate Program in Network Engineering and Security – A Feasibility Study

Author(s): Fahed Awad | Omar Banimelhem | Eyad Taqieddin | Raed Bani-Hani
An Approach for Secure Data Transmission in Private Cloud

Author(s): Anurag Porwal | Rohit Maheshwari | B.L.Pal | Gaurav Kakhani
Hardware Implementation of Mix Column Step in AES

Author(s): Pratap Kumar Dakua | Manoranjan Pradhan | Subba Rao Polamuri
An Approach for SMS Security using Authentication Functions

Author(s): Neetesh Saxena | Narendra S. Chaudhari
A New Security Protocol for Mobile Ad Hoc Networks

Author(s): K. Sahadevaiah | Prasad Reddy P.V.G.D. | G. Narsimha
Analyzing Digital Signature Robustness with Message Digest Algorithms

Author(s): Rubina B. Patel | Naveen Chaudhary
Privacy-Preserving Data Sharing Using Data Reconstruction Based Approach

Author(s): Kshitij Pathak | Narendra S. Chaudhari | Aruna Tiwari
Realization & Implementation of Wireless Parking System with GSM Based Security

Author(s): Meenakshi Tripathi | M. S. Gaur | Vijay Laxmi
Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3

Author(s): Nidhi Purohit | Richa Sinha | Hiteishi Diwanji
Analysis of Secure Mobile Agent System

Author(s): Rajesh Shrivastava | Pooja Mehta (Gahoi)
A Study of Role Based Access Control policies and Constraints

Author(s): Miriyala Markandeyulu | Bussa V.R.R.Nagarjuna | Akula Ratna Babu | A.S.K.Ratnam
New Approach of Data Encryption Standard Algorithm

Author(s): Shah Kruti R | Bhavika Gambhava
Cloud Computing: Different Approach & Security Challenge

Author(s): Maneesha Sharma | Himani Bansal | Amit Kumar Sharma

Tango Rapperswil
Tango Rapperswil

     Affiliate Program