|
Issue |
Title |
|
Vol 27, No 1: July 2022 |
Secure and efficient routing protocol for low-power and lossy networks for IoT networks |
Abstract
PDF
|
Soukayna Riffi Boualam, Mariya Ouaissa, Mariyam Ouaissa, Abdellatif Ezzouhairi |
|
Vol 21, No 3: March 2021 |
Secure and smart system for monitoring patients with critical cases |
Abstract
PDF
|
Hanan Abed Alwally Abed Allah, Rawsam Abduladheem Hasan |
|
Vol 28, No 1: October 2022 |
Secure authentication and privacy-preserving to improve video streaming vehicle ad-hoc network |
Abstract
PDF
|
Akeel Kassim Leaby, Mustafa Khalefa, Mushtaq A. Hasson, Ali A. Yassin |
|
Vol 27, No 2: August 2022 |
Secure cloud adoption model: novel hybrid reference model |
Abstract
PDF
|
Aiman Athambawa, Md Gapar Md Johar, Ali Khathibi |
|
Vol 7, No 3: September 2017 |
Secure Cloud based Privacy Preserving DataMinning Platform |
Abstract
PDF
|
S Kumaraswamy, Manjula S H, K R Venugopal |
|
Vol 12, No 1: January 2014 |
Secure Communication and Implementation for a Chaotic Autonomous System |
Abstract
PDF
|
LiFeng Zhang |
|
Vol 11, No 12: December 2013 |
Secure Digital Certificate Design Based on the Public Key Cryptography Algorithm |
Abstract
PDF
|
Zhang Qi ming |
|
Vol 21, No 1: January 2021 |
Secure dynamic source routing protocol for defending black hole attacks in mobile Ad hoc networks |
Abstract
PDF
|
M. Mohanapriya, Nitish Joshi, Mohit Soni |
|
Vol 29, No 2: February 2023 |
Secure fragile watermarking based on Huffman encoding and optimal embedding strategy |
Abstract
PDF
|
Mourad Zairi, Tarik Boujiha, Abdelhaq Ouelli |
|
Vol 28, No 2: November 2022 |
Secure hybrid fiber optic and free optical space communication systems |
Abstract
PDF
|
Arwa A. Moosa, Malik A. Alsaedi, Hussein Jumma Jabir, Mays Afif Anaee |
|
Vol 21, No 3: March 2021 |
Secure image hiding in speech signal by steganography-mining and encryption |
Abstract
PDF
|
Amal Hameed Khaleel, Iman Qays Abduljaleel |
|
Vol 28, No 1: October 2022 |
Secure smart home automation and monitoring system using internet of things |
Abstract
PDF
|
Mohamed Khudhair Al-Gburi, Laith Ali Abdul-Rahaim |
|
Vol 19, No 1: July 2020 |
Secure vehicle to vehicle voice chat based MQTT and CoAP internet of things protocol |
Abstract
PDF
|
Noor A. Hussein, Mohamed Ibrahim. Shujaa |
|
Vol 15, No 3: September 2015 |
Secured Communication Among HMI and Controller using RC-4 Algorithmand Raspberry Pi |
Abstract
PDF
|
Albert Sagala, Deni Parlindungan Lumbantoruan, Epelin Manurung, Iroma Situmorang, Adi Gunawan |
|
Vol 29, No 2: February 2023 |
Secured drone communication based on Esalsa20 algorithm and 1d logistic map |
Abstract
PDF
|
Ibtesam Jomaa, Worud Mahdi Saleh, Rasha Rokan Ismail Hassan, Saja Huzber Hussien Wadi |
|
Vol 23, No 1: July 2021 |
Secured protection of transmission line by distance relay using data mining approach |
Abstract
PDF
|
M. Kiruthika, Bindu S. |
|
Vol 35, No 3: September 2024 |
Secured web application based on CapsuleNet and OWASP in the cloud |
Abstract
PDF
|
Rohith Vallabhaneni, Sanjaikanth E. Vadakkethil Somanathan Pillai, Srinivas A. Vaddadi, Santosh Reddy Addula, Bhuvanesh Ananthan |
|
Vol 16, No 2: November 2015 |
SecureDBaaS Model for Accessing Encrypted Cloud Databases |
Abstract
PDF
|
Palle Jagadeeswaraiah, M.R. Pavan Kumar |
|
Vol 22, No 3: June 2021 |
Securing audio transmission based on encoding and steganography |
Abstract
PDF
|
Enas Wahab Abood, Zaid Ameen Abduljabbar, Mustafa A. Al Sibahee, Mohammed Abdulridha Hussain, Zaid Alaa Hussien |
|
Vol 10, No 2: May 2018 |
Securing Data Communication for Data Driven Applications Using End to End Encryption |
Abstract
PDF
|
Subhi Almohtasib, Alaa H Al-Hamami |
|
Vol 28, No 3: December 2022 |
Securing data using deep hiding selected least significant bit and adaptive swarm algorithm |
Abstract
PDF
|
Bashar Izzeddin Issa Aljidi, Sundresan Perumal, Sakinah Ali Pitchay |
|
Vol 11, No 4: April 2013 |
Securing Personal Health Records in the Cloud by Enforcing Sticky Policies |
Abstract
PDF
|
Chunxia Leng, Huiqun Yu, Jingming Wang, Jianhua Huang |
|
Vol 13, No 1: January 2019 |
Securing SAAS service under cloud computing based multi-tenancy systems |
Abstract
PDF
|
Trinathbasu Miriyala, JKR Sastry |
|
Vol 22, No 1: April 2021 |
Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device |
Abstract
PDF
|
Seniman Seniman, Baihaqi Siregar, Rani Masyithah Pelle, Fahmi Fahmi |
|
Vol 18, No 2: May 2020 |
Securing speech signals by watermarking binary images in the wavelet domain |
Abstract
PDF
|
Rakan Saadallah Rashid, Jafar Ramadhan Mohammed |
|
7026 - 7050 of 8410 Items |
<< < 277 278 279 280 281 282 283 284 285 286 > >> |