Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "private security"

ADD TO MY LIST
 
Public Health Security in the 21st Century

Author(s): Ramesh Kumar Verma | Pardeep Khanna | Shankar Prinja | Meena Rajput | Varun Aurora
Trust Negotiations Using Cryptographic Approach

Author(s): Sandeep.V, | Gitanjali .J
Public Claims: A Legal Evaluation

Author(s): Tamer Budak | Serkan Benk
Data Security : An Analysis

Author(s): Dr.S.B.Thorat | S.K.Nayak | M.M.Bokhare
Security Enhancement of Forward Digital Signatures Using ECC

Author(s): M.Rajasekhar | I.M.V.Krishna, | M.Samuel John
A Survey on Recent Security Trends using Quantum Cryptography

Author(s): T. Rubya | N. Prema Latha, | B. Sangeetha
SQL Injection Attacks: Techniques and Protection Mechanisms

Author(s): Nikita Patel | Fahim Mohammed, | Santosh Soni
DEVELOPMENT OF AN APICULTURE INSTITUTE IN THE DEPARTMENT OF RISARALDA

Author(s): Gomez-Angel Margarita | Tello-Duran Jose | Muños-Sanchez Liliana Patricia
System Integration for Smart Paperless Ship

Author(s): O. Sulaiman | A.H. Saharuddin | A.B.S. Kader
E-COMMERCE WITH ONLINE PAYMENT THROUGH BANK CARD

Author(s): OANA ŞEITAN | CRISTINA GHERMAN | CĂTĂLIN NICOLAE BULGĂREA
NOVEL APPROACH TO RESOLVE NETWORK SECURITY ISSUES IN IP-PBX IN CONVERGED ARCHITECTURE

Author(s): MUNIR B. SAYYAD, | NILESH NIKAM | S.L NALBALWAR
Uncoercibility In E-Voting And E-Auctioning Mechanisms Using Deniable Encryption

Author(s): Jaydeep Howlader | Vivek Nair | Saikat Basu | A. K. Mal
A New Algorithm for Creating Digital Certificate’s Private Key from Iris

Author(s): Mahboubeh Shamsi | AbdolReza Rasouli | Soudeh Shadravan | Farrokh Koropi
A Fuzzy QOS Keybase Secured Manet Routing with Multipath Data Fragmentation (FQKSMR)

Author(s): Manjunath Gadiparthi | Ramakrishna Paladugu | Sudhakar Paladugu | Muralidhar Vejendla
Internet Adoption in Indonesian Education: Are Female Teachers Able to Use and Anxious of Internet?

Author(s): Farida | Sri Wulan Windu Ratih | Betty Yudha Sulistiowati | Budi Hermana
Enterprise Delegation for Service Based Systems

Author(s): Coimbatore Chandersekaran | William R. Simpson
A NEW VARIANT OF SUBSET-SUM CRYPTOSYSTEM OVER RSA

Author(s): Sonal Sharma | Saroj Hiranwal | Prashant Sharma
The Effective and Efficient Security Services For Cloud Computing

Author(s): Sambhaji Sarode | Deepali Giri | Khushbu Chopde
Progress of Banking in India: Customers' Perspectives

Author(s): Dr. Komal | Dr. Vandna Rani
A P2P Approach for Efficient Certificate Revocation in MANET

Author(s): Suresh Babu Tumula | K.R.R.Mohana Rao
Bluetooth Security Threats And Solutions: A Survey

Author(s): Nateq Be-Nazir Ibn Minar | Mohammed Tarique
Performance Evaluation of Wi-Fi comparison with WiMAX Networks

Author(s): M.Sreerama Murty | D.Veeraiah | A.Srinivas Rao
Policy, Perception and Health Care Utilization in Myanmar

Author(s): Soe Moe | Daw Khin Saw Naing
Trust Model for Reliable File Exchange In Cloud Computing

Author(s): Edna Dias Canedo | Rafael Timoteo de Sousa Junior | Robson de Oliveira Albuquerque
An Approach for Secure Data Transmission in Private Cloud

Author(s): Anurag Porwal | Rohit Maheshwari | B.L.Pal | Gaurav Kakhani
New Approach of Data Encryption Standard Algorithm

Author(s): Shah Kruti R | Bhavika Gambhava
Enhancing Infrastructure Security in Real Estate

Author(s): Kyle Dees | Syed (Shawon) Rahman
Securing IEEE 802.11g WLAN Using Open VPN and its Impact Analysis

Author(s): Praveen Likhar | Ravi Shankar Yadav | Keshava Rao M
Statistical Quality Control Approaches to Network Intrusion Detection

Author(s): Rohitha Goonatilake | Rafic Bachnak | Susantha Herath
A Secured Chat System With Authentication Technique As RSA Digital Signature

Author(s): Oyinloye O.Elohor | Ogemuno Emamuzo | Akinbohun Folake | Ayodeji .I. Fasiku
Bayesian Spam Filtering using Statistical Data Compression

Author(s): V. Sudhakar | CPVNJ.Mohan Rao | Satya Pavan Kumar Somayajula
Review of e-Government Policy and Outcomes in the kingdom of Saudi Arabia

Author(s): Mohammed Ateeq Alanezi | Ahmad Kamil Mahmood | Shuib Basri
The costs in provision of haemodialysis in a developing country: A multi-centered study

Author(s): Ranasinghe Priyanga | Perera Yashasvi | Makarim Mohamed | Wijesinghe Aruna | Wanigasuriya Kamani
A New Robust Watermarking Scheme to Increase Image Security

Author(s): Rahmani Hossein | Mortezaei Reza | Ebrahimi Moghaddam Mohsen
A case study for efficient management of high throughput primary lab data

Author(s): Colmsee Christian | Flemming Steffen | Klapperstück Matthias | Lange Matthias | Scholz Uwe
NAT Traversing Solutions for SIP Applications

Author(s): Chen Whai-En | Huang Ya-Lin | Chao Han-Chieh
Performance of Various Mobile IP Protocols and Security Considerations

Author(s): K.V.Ramana Ph.D., Raghu.B.Korrapati Ph.D., K.S.S. Praveen Kumar & Bh.V. Naveen
Analysis on DNA based Cryptography to Secure Data Transmission

Author(s): S.Jeevidha | Dr.M.S.Saleem Basha | Dr.P.Dhavachelvan
Satisfaction with the Prenatal Clinics in Zanjan, Iran

Author(s): Roghayeh Heidari | Sedigheh Borna | Fedieh Haghollahi | Mamak Shariat | Sheila Duaii
Design and Implementation of Web Based Remote Supervisory Control and Information System

Author(s): R. Kirubashankar | K. Krishnamurthy | J. Indra | B.Vignesh
Estado, mercado y seguridad ciudadana. Ánalisis de la articulación entre la seguridad pública y privada eb España

Author(s): Bosch, José Luis | Farrás, Jaume | Martín, Manuel | Sabaté, Juli | Torrente, Diego
Detection of threats in Honeynet using Honeywall

Author(s): Navita Sharma | Sukhwinder Singh Sran
An Efficient Secure Multicast Communication for P2P Network

Author(s): Huaiqing Lin | Zhengbing Hu | Yonghong Zhou
Cryptanalysis on Identity-based Authenticated Key Agreement Protocols from Pairings

Author(s): Mengbo Hou | Qiuliang Xu | Shanqing Guo | Han Jiang
Guest Editorial

Author(s): Hsing-Chung Chen | Franz I.S. Ko | Yung-Chen Chou | Shyan-Ming Yuan | Yaw-Chung Chen | Chin-Chen Chang | Jyh-Horng Wen | Shiuh-Jeng Wang | Yuh-Ren Tsai | Keh-Ming Lu
Research on the Problem of Privacy-Preserving Closest Pair

Author(s): Cheng Chao | Yonglong Luo | Wenjuan Cheng
The eProcurement in Jordan: Measurements of Private Sector eMaturity

Author(s): Adeeb A. Sarayrah | Ghassan A. Al-Utaibi
The Influence of Personal and Organizational Factors on Ethical Decision Making Intentions among Managers

Author(s): Zetty Zahureen Mohd Yusoff | Wan Anisabanum Salleh | Zainuddin Zakaria | Gopala Krishnan Sekharan Nair | Thenmolli Vadeveloo | Azyanee Luqman
Development of Enhanced Token using Picture Password and Public Key Infrastructure Mechanism for Digital Signature

Author(s): Oghenerukevwe E. Oyinloye | Ayodeji .I. Fasiku | Boniface K.Alese | Akinbohun Folake
Efficient Anonymizations with Enhanced Utility

Author(s): Jacob Goldberger | Tamir Tassa
Effective Ways of Secure Private and Trusted Cloud Computing

Author(s): Pardeep Kumar | Vivek Kumar Sehgal | Durg Singh Chauhan | P K Gupta | Manoj Diwakar
Setting up of an Open Source based Private Cloud

Author(s): G R Karpagam | J Parkavi
from Editorial

Author(s): Ugur dEMİRAY
A Fast Approach for Breaking RSA Cryptosystem

Author(s): Alaa H Al-Hamami | Bilal S O Al-Kubaysee
An Enhancement of Security on Image Applying Asymmetric Key Algorithm

Author(s): Sabyasachi Samanta | Saurabh Dutta | Gautam Sanyal
E-Voting Protocol Based On Public-Key Cryptography

Author(s): Hayam K. Al-Anie | Mohammad A. Alia | Adnan A. Hnaif
Cryptovirology: Virus Approach

Author(s): Shivale Saurabh Anandrao
Cryptographic Algorithms for Secure Data Communication

Author(s): Zirra Peter Buba | Gregory Maksha Wajiga
Phishing: A Field Experiment

Author(s): Danuvasin Charoen, Ph.D.
A Review on Cryptography Mechanisms

Author(s): Prof ML Sharma | Er. Sheetal Atri
Effective and Extensive Virtual Private Network

Author(s): Tarek S. Sobh | Yasser Aly
The future of death in America

Author(s): Samir Soneji | Gary King
Reducing False Alerts Using Intelligent Hybrid Systems

Author(s): Sravan Kumar Jonnalagadda | Subha Sree Mallela
Efficiency Analysis for Public Key Systems Based on Fractal Functions

Author(s): Nadia M.G. AL-Saidi | Mohamad R.M. Said | Adil M. Ahmed

Tango Jona
Tangokurs Rapperswil-Jona

     Affiliate Program