Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "security"

ADD TO MY LIST
 
DIFFERENT SECURITY MECHANISMS FOR DIFFERENT TYPE OF SECURITY LAPSES IN WMN- A REVIEW

Author(s): Narender Singh | Kuldeep Vats | Jasvinder | Lovish Jaiswal
A Comparative Study of Software Requirements Tools For Secure Software Development

Author(s): Mohammad Ubaidullah Bokhari | Shams Tabrez Siddiqui
Appetite and falls: Old age and lived experiences

Author(s): Marianne Mahler | Anneli Sarvimäki
Hash Security for Ad hoc Routing

Author(s): Ashwani Kush | C. Hwang
Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages

Author(s): Mallikka Rajalingam | Saleh Ali Alomari | Putra Sumari
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System

Author(s): Razi Hosseinkhani | H. Haj Seyyed Javadi
Recourse Management Using a Fair Share Scheduler

Author(s): Suja Cherukullapurath Mana
Semantic Massage Addressing based on Social Cloud Actor's Interests

Author(s): Reem M. Bahgat | Akram I. Salah | Hamada I. Abdul Wakeil
A Micro-Mobility Management Scheme for Handover and Roaming

Author(s): Debabala Swain | Siba Prasada Panigrahi | Prasanta Kumar Patra
Audio Steganography Coding Using the Discrete Wavelet Transforms

Author(s): Siwar Rekik | Driss Guerchi | Habib Hamam | Sid-Ahmed Selouani
A LOCATION TRACER WITH SOCIAL NETWORKING SERVICES

Author(s): PRIYA A. KOTWAL | KAPIL JULWANI | SUNIL L. BANGARE | PALLAVI S. BANGARE
New Proposed Classic Cluster Layer Architecture for Mobile Adhoc Network (cclam)

Author(s): Kuldeep Sharma | Nikhil Khandelwal | Sanjeev Kumar Singh
UNAPPROVED ACCESS POINT ELIMINATION IN WLAN USING MULTIPLE AGENTS AND SKEW INTERVALS

Author(s): Prof.S.B.Vanjale | J.A.Dave | Prof.P.B.Mane
Quality and Distortion Evaluation of Audio Signal by Spectrum

Author(s): Er. Niranjan Singh | Dr. Bhupendra Verma
The perception of Sao Paulo state consumers in relation to ship meat: analysis by principal components Percepção de consumidores paulistas em relação à carne ovina: análise fatorial por componentes principais

Author(s): Ricardo Firetti | Celso da Costa Carrer | Vivian Lara Silva | Marco Antônio Trindade | Silvio César de Souza | Holmer Savastano Júnior | Marcelo Machado de Luca de Oliveira Ribeiro
HWSW IMPLEMENTATION OF IRIS RECOGNITION ALGORITHM IN THE FPGA

Author(s): Hentati Raida | YassineAoudni | Mohamed Abid
TRACKING OF INTRUDERS ON GEOGRAPHICAL MAP USING IDS ALERT

Author(s): Manish Kumar | M. Hanumanthappa | T.V. Suresh Kumar
The Geographic Origins of Strategic Culture

Author(s): Stephen B. Smith
IMPLEMENTATION OF THE TRIPLE-DES BLOCK CIPHER USING VHDL

Author(s): Sai Praveen Venigalla | M. Nagesh Babu | Srinivas Boddu | G. Santhi Swaroop Vemana
Chemical cautery of the inferior turbinates with trichloroacetic acid

Author(s): Azevedo, Alexandre Fernandes de | Martins, Dário Antunes | Cardoso, Caroline Guimarães | Moraes, Itamar Fernando Cândido de | Michel, Luciane Maria Pereira | Leite, Laura Hora Rios
Secure Cooperative Spectrum Sensing based on the Distance between Bodies of Evidence

Author(s): Xiwen Tang | Yingguan Wang | Yi Wang | Yanjun Hu
Security Policy Management Process within Six Sigma Framework

Author(s): Erdal Oruklu | Jafar Saniie | Vijay Anand
Evaluation of Electrocardiogram for Biometric Authentication

Author(s): S K Singh | Yogendra Narain Singh
The Spirituality Questionnaire: Core Dimensions of Spirituality

Author(s): Gerhild Becker | Malgorzata Dragan | Carola Xander | Jochen Hardt | Sonja Schultz
Grounding Locations Assessment of Practical Power System

Author(s): Kousay Abdul Sattar | Ahmed M. A. Haidar | Nadheer A. Shalash
Forest Biomass Availability Analysis and Large-Scale Supply Options

Author(s): Eero Jäppinen | Kalle Karttunen | Tapio Ranta | Olli-Jussi Korpinen
Safety Aspects in the Distance Learning Systems

Author(s): Alexander Zyma | Yousef Daradkeh | Sergii Kavun
Personnel Security outside the Box

Author(s): Sergey Yesin | Semyon Ioffe
Research on User Permission Isolation for Multi-Users Service-Oriented Program

Author(s): Liang Peng | Yingxu Lai | Shupo Bu | Zhan Jing | Li Yu | Jiang Wei | Lin Li
Safety Aspects in the Distance Learning Systems

Author(s): Alexander Zyma | Yousef Daradkeh | Sergii Kavun
Personnel Security outside the Box

Author(s): Sergey Yesin | Semyon Ioffe
Research on User Permission Isolation for Multi-Users Service-Oriented Program

Author(s): Liang Peng | Yingxu Lai | Shupo Bu | Zhan Jing | Li Yu | Jiang Wei | Lin Li
Socio-Economic Characteristics of HIV in a South African Prison

Author(s): Jeff Gow | Bligh Grant | Mark Colvin
Perceived access to mental health services in three municipalities of Antioquia, 2004-2006

Author(s): Silvia Henao H | Vilma Restrepo R | Andrés F. Alzate R | Carlos M. González P
Condiciones de trabajo y evaluación de los factores de riesgo presentes en la población rural

Author(s): Agustín Vega Torres | Luz Andrea Rodríguez Rojas | Leonardo Emiro Contreras Bravo
Desempeño de la calidad del servicio (QoS) sobre IPv6

Author(s): Octavio José Salcedo Parra | Danilo López | Ángela Patricia Ríos
A alta progressiva como meio de reinserção social do paciente do manicômio judiciário

Author(s): Caroline Velasquez Marafiga | Elizabete Rodrigues Coelho | Maycoln Leôni Martins Teodoro
Secure And Reliable Routing In Mobile Adhoc Networks

Author(s): Rachid Haboub | Mohammed Ouzzif
Segment Based Visual Cryptography For Key Distribution

Author(s): Sesha Pallavi Indrakanti | Avadhani P S
Improved Performance by Parametrizing Wavelet Filters for Digital Image Watermarking

Author(s): Mangaiyarkarasi Palanivel | Arulselvi Shanmugam
A Hybrid Image Cryptosystem Based On OMFLIP Permutation Cipher

Author(s): G.Sudheer | B.V.S.Renuka Devi
Digital Signatura Schemes for Secure Video

Author(s): R. N. Mandavgane | N.G.Bawane
A Survey on Cross Layer Security

Author(s): Sandeep Sharma | Rajesh Mishra | Karan Singh
Methodology for Human Face retrieval from video sequences based on holistic approach

Author(s): Z. G. Sheikh | V.M. Thakare | S. S. Sherekar
Security issues in Cloud Computing

Author(s): Kalyani D. Kadam | Sonia K. Gajre | R. L. Paikrao
Split Personality Malware: A Security Threat

Author(s): Nisha Lalwani | M.B.Chandak | R.V.Dharaskar
Trust Model for Reliable File Exchange In Cloud Computing

Author(s): Edna Dias Canedo | Rafael Timoteo de Sousa Junior | Robson de Oliveira Albuquerque
Generic Network Intrusion Prevention System

Author(s): Kamini Nalavade | B.B.Meshram
Antiphishing Model with URL & Image based Webpage Matching

Author(s): Madhuri S. Arade | P.C. Bhaskar | R.K.Kamat
Mathematical Model for Digital Video Watermarking Based On 3D Wavelet Transform

Author(s): Sonam A. Bhandari | Amar D. Rana | Swati Z. Bhandari
Real time Video Streaming using Novel approach

Author(s): Mukesh Kumar | Jain Akash | B.A.Khivsara | Magar Padmakar | Baphana Abliasaha
Efficient Face Detection using Adaboost

Author(s): K.T.Talele | Sunil Kadam | Atul Tikare
Image Stenography Skin Tone Detection

Author(s): DEEPALI BHAMARE | VIKAS GUPTA | P.B.SALUNKHE
Botnet-A Network Threat

Author(s): Sonal P.Patil | Swatantra Kumar
Artificial Intelligence with Stereo Vision Algorithms and its Methods

Author(s): Sahil S.Thakare | Rupesh P. Arbal | Makarand R. Shahade
Multimodal Biometric Feature based Person Classification

Author(s): Smita Thakre | Kalyani Mamulkar | Prachi Motghare | Pooja Godi | Ujwalla Gawande
A Novel Approach for Iris Encryption

Author(s): Shrinivasrao B. Kulkarni | Ravindra S. Hegadi | Umakant P. Kulkarni
Desing and Implementation of Distributed Security using Onion Routing

Author(s): Ashish T. Bhole | Savita H. Lambole
Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS

Author(s): Prasad Patil | Rinku Shah | Kajal Jewani
Antiphishing Model with URL & Image based Webpage Matching

Author(s): Madhuri S. Arade | P.C. Bhaskar | R.K.Kamat
Data Integrity and Confidentiality in Outsourced Database

Author(s): Sonal Balpande | Rajashree Shegde | Lata Ragha
New Improved Methodology for Pedestrian Detection in Advanced Driver Assistance System

Author(s): Vijay Gaikwad | Shashikant Lokhande | Sanket Manthan
Secured and Authenticated Sharing of Software Program

Author(s): Madhavi Gangurde | Umashankar prasad | Ranvir Kumar | Prashant Prajapati
Security Enhancement Algorithms for Data Transmission for Next Generation Networks

Author(s): Vikas Kaul | S K Narayankhedkar | S Achrekar | S Agarwal
Undergraduate Program in Network Engineering and Security – A Feasibility Study

Author(s): Fahed Awad | Omar Banimelhem | Eyad Taqieddin | Raed Bani-Hani
An Approach for Secure Data Transmission in Private Cloud

Author(s): Anurag Porwal | Rohit Maheshwari | B.L.Pal | Gaurav Kakhani
Hardware Implementation of Mix Column Step in AES

Author(s): Pratap Kumar Dakua | Manoranjan Pradhan | Subba Rao Polamuri
An Approach for SMS Security using Authentication Functions

Author(s): Neetesh Saxena | Narendra S. Chaudhari
A New Security Protocol for Mobile Ad Hoc Networks

Author(s): K. Sahadevaiah | Prasad Reddy P.V.G.D. | G. Narsimha
Analyzing Digital Signature Robustness with Message Digest Algorithms

Author(s): Rubina B. Patel | Naveen Chaudhary
Privacy-Preserving Data Sharing Using Data Reconstruction Based Approach

Author(s): Kshitij Pathak | Narendra S. Chaudhari | Aruna Tiwari
Realization & Implementation of Wireless Parking System with GSM Based Security

Author(s): Meenakshi Tripathi | M. S. Gaur | Vijay Laxmi
Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3

Author(s): Nidhi Purohit | Richa Sinha | Hiteishi Diwanji
Analysis of Secure Mobile Agent System

Author(s): Rajesh Shrivastava | Pooja Mehta (Gahoi)
A Study of Role Based Access Control policies and Constraints

Author(s): Miriyala Markandeyulu | Bussa V.R.R.Nagarjuna | Akula Ratna Babu | A.S.K.Ratnam
New Approach of Data Encryption Standard Algorithm

Author(s): Shah Kruti R | Bhavika Gambhava
Cloud Computing: Different Approach & Security Challenge

Author(s): Maneesha Sharma | Himani Bansal | Amit Kumar Sharma
Why do you need a reservation system?      Affiliate Program