|
Issue |
Title |
|
Vol 16, No 2: November 2015 |
SecureDBaaS Model for Accessing Encrypted Cloud Databases |
Abstract
PDF
|
Palle Jagadeeswaraiah, M.R. Pavan Kumar |
|
Vol 22, No 3: June 2021 |
Securing audio transmission based on encoding and steganography |
Abstract
PDF
|
Enas Wahab Abood, Zaid Ameen Abduljabbar, Mustafa A. Al Sibahee, Mohammed Abdulridha Hussain, Zaid Alaa Hussien |
|
Vol 10, No 2: May 2018 |
Securing Data Communication for Data Driven Applications Using End to End Encryption |
Abstract
PDF
|
Subhi Almohtasib, Alaa H Al-Hamami |
|
Vol 28, No 3: December 2022 |
Securing data using deep hiding selected least significant bit and adaptive swarm algorithm |
Abstract
PDF
|
Bashar Izzeddin Issa Aljidi, Sundresan Perumal, Sakinah Ali Pitchay |
|
Vol 11, No 4: April 2013 |
Securing Personal Health Records in the Cloud by Enforcing Sticky Policies |
Abstract
PDF
|
Chunxia Leng, Huiqun Yu, Jingming Wang, Jianhua Huang |
|
Vol 13, No 1: January 2019 |
Securing SAAS service under cloud computing based multi-tenancy systems |
Abstract
PDF
|
Trinathbasu Miriyala, JKR Sastry |
|
Vol 22, No 1: April 2021 |
Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device |
Abstract
PDF
|
Seniman Seniman, Baihaqi Siregar, Rani Masyithah Pelle, Fahmi Fahmi |
|
Vol 18, No 2: May 2020 |
Securing speech signals by watermarking binary images in the wavelet domain |
Abstract
PDF
|
Rakan Saadallah Rashid, Jafar Ramadhan Mohammed |
|
Vol 26, No 2: May 2022 |
Security approach for instant messaging applications: viber as a case study |
Abstract
PDF
|
Mohammed Falih Kadhim, Adel Al-Janabi, Ahmed Hazim Alhilali, Nabeel Salih Ali |
|
Vol 16, No 2: November 2019 |
Security assessment of four open source software systems |
Abstract
PDF
|
Faraz Idris Khan, Yasir Javed, Mamdouh Alenezi |
|
Vol 11, No 1: July 2018 |
Security Authentication for Student Cards’ Biometric Recognition Using Viola-Jones Algorithm |
Abstract
PDF
|
S. Ibrahim, K.R. Jamaluddin, K.A.F.A. Samah |
|
Vol 33, No 2: February 2024 |
Security enhancement of cyber-physical system using modified encryption AESGNRSA technique |
Abstract
PDF
|
Kundankumar Rameshwar Saraf, P. Malathi |
|
Vol 12, No 6: June 2014 |
Security Evaluation for RFID System: Security Evaluation Index Architecture and Evaluation Model |
Abstract
PDF
|
Hengfeng Luo, Ruiqi Liu, Yingkai Wang, Jinghao Chen |
|
Vol 15, No 2: August 2015 |
Security for Mobile Agents: Trust Estimate for Platforms |
Abstract
PDF
|
Razouki Hassan, Hair Abdellatif |
|
Vol 6, No 2: May 2017 |
Security for Virtualization in Cloud Services using Duplication Method |
Abstract
PDF
|
N.L. Udaya Kumar, M. Siddappa |
|
7381 - 7395 of 8800 Items |
<< < 488 489 490 491 492 493 494 495 496 497 > >> |