Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             122 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish Patil, Priyadarshini
2016
78 C p. 617-624
8 p.
artikel
2 A Critical Analysis of Energy Efficient Virtual Machine Placement Techniques and its Optimization in a Cloud Computing Environment Choudhary, Ankita
2016
78 C p. 132-138
7 p.
artikel
3 A Current Study on the Limitations of Agile Methods in Industry Using Secure Google Forms Agrawal, Ashish
2016
78 C p. 291-297
7 p.
artikel
4 Adaptive Lossless Medical Image Watermarking Algorithm Based on DCT & DWT Mehto, Amit
2016
78 C p. 88-94
7 p.
artikel
5 Adaptive Selection of Cryptographic Protocols in Wireless Sensor Networks using Evolutionary Game Theory Arora, Srishti
2016
78 C p. 358-366
9 p.
artikel
6 Advanced Automated Module for Smart and Secure City Solanki, Vijender Kumar
2016
78 C p. 367-374
8 p.
artikel
7 A Dynamic Data Replication in Grid System Warhade, Sonali
2016
78 C p. 537-543
7 p.
artikel
8 A Keyless Approach for RDH in Encrypted Images using Visual Cryptography Ansari Miss., Nuzhat
2016
78 C p. 125-131
7 p.
artikel
9 A Multilayered Secure Scheme for Transmission of Sensitive Information based on Steganalysis D'Souza, Divya Jennifer
2016
78 C p. 375-381
7 p.
artikel
10 Analysis of K-Means and K-Medoids Algorithm For Big Data Arora, Preeti
2016
78 C p. 507-512
6 p.
artikel
11 Android Applications Repackaging Detection Techniques for Smartphone Devices Rastogi, Sajal
2016
78 C p. 26-32
7 p.
artikel
12 A New Approach for Video Steganography Based on Randomization and Parallelization Sudeepa K.B.,
2016
78 C p. 483-490
8 p.
artikel
13 A Novel Algorithmic Approach for an Automatic Data Placement for NUMA Based Design Madarkar, Jitendra
2016
78 C p. 276-283
8 p.
artikel
14 A Novel Approach for Fault Tolerance Control System and Embedded System Security Khadse, Tushar S.
2016
78 C p. 799-806
8 p.
artikel
15 A Novel Graph Centrality Based Approach to Analyze Anomalous Nodes with Negative Behavior Kaur, Ravneet
2016
78 C p. 556-562
7 p.
artikel
16 Anti-Hijack: Runtime Detection of Malware Initiated Hijacking in Android Shankar, Venkatesh Gauri
2016
78 C p. 587-594
8 p.
artikel
17 A Partition Based Novel Approach in AFIS for Forensics & Security Shrivastava, Ankit
2016
78 C p. 771-776
6 p.
artikel
18 Appropriate Channel Selection for Data Transmission in Cognitive Radio Networks Moon, Minal S.
2016
78 C p. 838-844
7 p.
artikel
19 A Probabilistic Gossip-based Secure Protocol for Unstructured P2P Networks Srivastava, Anubhava
2016
78 C p. 595-602
8 p.
artikel
20 A Review on Noisy Password, Voiceprint Biometric and One-Time-Password Kumbhare, Komal K.
2016
78 C p. 382-386
5 p.
artikel
21 A Review on Security Related Aspects in Vehicular Adhoc Networks Kaur, Navjot
2016
78 C p. 387-394
8 p.
artikel
22 A Review on the Various Security Techniques for VANETs Singh, Amandeep
2016
78 C p. 284-290
7 p.
artikel
23 A Review on Video Security Using Visual Cryptosystem Gadicha Mr., Ajay B.
2016
78 C p. 729-733
5 p.
artikel
24 A Review Over Genetic Algorithm and Application of Wireless Network Systems Shahi, Bimlendu
2016
78 C p. 431-438
8 p.
artikel
25 A Secure Authentication Scheme for RFID Systems Dass, Prajnamaya
2016
78 C p. 100-106
7 p.
artikel
26 A Study on Security Vulnerability on Cloud Platforms Majhi, Santosh Kumar
2016
78 C p. 55-60
6 p.
artikel
27 A Survey of Virtual Machine Placement Techniques in a Cloud Data Center Usmani, Zoha
2016
78 C p. 491-498
8 p.
artikel
28 A Survey on Keypoint Based Copy-paste Forgery Detection Techniques Warbhe, Anil Dada
2016
78 C p. 61-67
7 p.
artikel
29 A Survey on Scheduling Schemes with Security in Wireless Sensor Networks Mahidhar, Rashmi
2016
78 C p. 756-762
7 p.
artikel
30 Authorized Deduplication: An Approach for Secure Cloud Environment Waghmare, Vivek
2016
78 C p. 815-823
9 p.
artikel
31 Authorship Verification of Online Messages for Forensic Investigation Nirkhi, Smita
2016
78 C p. 640-645
6 p.
artikel
32 Automated Discovery of JavaScript Code Injection Attacks in PHP Web Applications Gupta, Shashank
2016
78 C p. 82-87
6 p.
artikel
33 Boolean Signatures for Metamorphic Malware Ranjan, Aditya Kaushal
2016
78 C p. 255-262
8 p.
artikel
34 Cascade Forward Back-propagation Neural Network Based Group Authentication Using (n, n) Secret Sharing Scheme Narad, Supriya
2016
78 C p. 185-191
7 p.
artikel
35 Cellular Network Fraud & Security, Jamming Attack and Defenses Hiremath, Rupa
2016
78 C p. 233-240
8 p.
artikel
36 Cluster Based Wireless Mobile Healthcare System for Physiological Data Monitoring Tambe, Sagar B.
2016
78 C p. 40-47
8 p.
artikel
37 Comparative Analysis of Authenticated Key Agreement Protocols Based on Elliptic Curve Cryptography Nimbhorkar, Sonali
2016
78 C p. 824-830
7 p.
artikel
38 Computationally Efficient Digital Image Forensic Method for Image Authentication Warbhe, Anil Dada
2016
78 C p. 464-470
7 p.
artikel
39 Computation of Various QoS Parameters for FiWi Access Network Upadhyay, Raksha
2016
78 C p. 172-178
7 p.
artikel
40 Contents 2016
78 C p. iii-vi
nvt p.
artikel
41 Controlled Broadcast Protocol for Location Privacy in Mobile Applications Jagdale, B.N.
2016
78 C p. 782-789
8 p.
artikel
42 Crime Data Analysis Using Pig with Hadoop Jain, Arushi
2016
78 C p. 571-578
8 p.
artikel
43 Critical Study of Performance Parameters on Distributed File Systems Using MapReduce Vaidya, Madhavi
2016
78 C p. 224-232
9 p.
artikel
44 Crowdsourcing Software Development: Many Benefits Many Concerns Hasteer, Nitasha
2016
78 C p. 48-54
7 p.
artikel
45 Cryptanalysis of Zuhua Shao key Authentication Scheme Kumaraswamy, P.
2016
78 C p. 95-99
5 p.
artikel
46 Cryptic Mining for Automatic Variable Key Based Cryptosystem Prajapat, Shaligram
2016
78 C p. 199-209
11 p.
artikel
47 Cryptographic Key Protection in a Cryptoprocessor Rajitha, N.
2016
78 C p. 271-275
5 p.
artikel
48 Cyber Physical Systems & Public Utility in India: State of Art Majhi, Santosh Kumar
2016
78 C p. 777-781
5 p.
artikel
49 DDOS Attack Aware DSR Routing Protocol in WSN Upadhyay, Raksha
2016
78 C p. 68-74
7 p.
artikel
50 Dependency Analysis for Secured Code Level Parallelization Jagtap, Vandana
2016
78 C p. 831-837
7 p.
artikel
51 Design and Analysis of Real Time Video Processing Based on DWT Architecture for Mobile Robots Naik, Pramod Kumar
2016
78 C p. 544-549
6 p.
artikel
52 Design and Implementation of Trust Based Approach to Mitigate Various Attacks in Mobile Ad hoc Network Dangare Mr., Nilesh N.
2016
78 C p. 342-349
8 p.
artikel
53 Detection of Moving Objects in Surveillance Video by Integrating Bottom-up Approach with Knowledge Base Aarthi R.,
2016
78 C p. 160-164
5 p.
artikel
54 Detection of Obfuscation in Java Malware Kumar, Renuka
2016
78 C p. 521-529
9 p.
artikel
55 Developing a Novel Technique for Face Liveness Detection Fernandes Mr., Steven Lawrence
2016
78 C p. 241-247
7 p.
artikel
56 Developing a Novel Technique to Match Composite Sketches with Images Captured by Unmanned Aerial Vehicle Fernandes Mr., Steven Lawrence
2016
78 C p. 248-254
7 p.
artikel
57 E-commerce Security through Elliptic Curve Cryptography Ahmad, Khaleel
2016
78 C p. 867-873
7 p.
artikel
58 Effective Cache Management and Pollution Reduction for Online Privacy Joshi, Mayuri
2016
78 C p. 722-728
7 p.
artikel
59 Efficient Keyword Search over Encrypted Cloud Data Meharwade, Anuradha
2016
78 C p. 139-145
7 p.
artikel
60 Empirical Analysis of Web Attacks Kaur, Daljit
2016
78 C p. 298-306
9 p.
artikel
61 Employing Speeded Scaled Conjugate Gradient Algorithm for Multiple Contiguous Feature Vector Frames: An Approach for Traffic Density State Estimation Borkar, Prashant
2016
78 C p. 740-747
8 p.
artikel
62 Energy Efficient Segmentation for Green FiWi network Bhatt, Uma Rathore
2016
78 C p. 75-81
7 p.
artikel
63 Establishment of Light Weight Cryptography for Resource Constraint Environment Using FPGA Baskar, Chanthini
2016
78 C p. 165-171
7 p.
artikel
64 Exponential Simplification Using Euler's and Fermat's Theorem Mohan, Maya
2016
78 C p. 714-721
8 p.
artikel
65 Future Weather Forecasting Using Soft Computing Techniques Khajure, Sanjay
2016
78 C p. 402-407
6 p.
artikel
66 Fuzzy Logic Based Image Encryption for Confidential Data Transfer Using (2, 2) Secret Sharing Scheme Mudia Miss., Hinal M.
2016
78 C p. 632-639
8 p.
artikel
67 Gesture Control Using Single Camera for PC Lalithamani, N.
2016
78 C p. 146-152
7 p.
artikel
68 GPS Based Distributed Communication Protocol for Static Sensor Network (GDCP) Nighot, Mininath
2016
78 C p. 530-536
7 p.
artikel
69 Grouping the Executables to Detect Malwares with High Accuracy Sahay, Sanjay K.
2016
78 C p. 667-674
8 p.
artikel
70 Hidden Biometric Security Implementation through Human Brain's Artificial Macro Structure Maheshwari, Saurabh
2016
78 C p. 625-631
7 p.
artikel
71 Image Bit Depth Plane Digital Watermarking for Secured Classified Image Data Transmission Khandare, Shrinivas
2016
78 C p. 698-705
8 p.
artikel
72 Information Retrieval System and Machine Translation: A Review Madankar, Mangala
2016
78 C p. 845-850
6 p.
artikel
73 Integrated ECC and Blowfish for Smartphone Security Patel, Payal
2016
78 C p. 210-216
7 p.
artikel
74 Issues in Achieving Complete Interoperability while Sharing Electronic Health Records Bhartiya, Shalini
2016
78 C p. 192-198
7 p.
artikel
75 Keyword Based Search and its Limitations in the Patent Document to Secure the Idea from its Infringement Kumar, Ranjeet
2016
78 C p. 439-446
8 p.
artikel
76 Legal Issues in Secure Implementation of Bring Your Own Device (BYOD) Dhingra, Madhavi
2016
78 C p. 179-184
6 p.
artikel
77 Mathematical Model of Security Framework for Routing Layer Protocol in Wireless Sensor Networks Pathak, Ganesh R.
2016
78 C p. 579-586
8 p.
artikel
78 Medicine Reminder and Monitoring System for Secure Health Using IOT Zanjal, Samir V.
2016
78 C p. 471-476
6 p.
artikel
79 Modified MASK Algorithm for Image Encryption Wali, Heera G.
2016
78 C p. 603-609
7 p.
artikel
80 Multi-layer Defense Against Malware Attacks on Smartphone Wi-Fi Access Channel Sharma, Kavita
2016
78 C p. 19-25
7 p.
artikel
81 Multilevel Secure RFID Based Object Tracking System Bapat, Ajinkya C.
2016
78 C p. 336-341
6 p.
artikel
82 Multimodal Fingerprint Spoof Detection Using White Light Balaji, Aadhithya
2016
78 C p. 330-335
6 p.
artikel
83 Multiple Applications Sharing for Effective Load Balancing in Secured Distributed Environment Kimmatkar, Kavita
2016
78 C p. 763-770
8 p.
artikel
84 Neural Network Approach to Iris Recognition in Noisy Environment Hajari, Kamal
2016
78 C p. 675-682
8 p.
artikel
85 Neural Network Pattern Classification and Weather Dependent Fuzzy Logic Model for Irrigation Control in WSN Based Precision Agriculture Mohapatra, Ambarish G.
2016
78 C p. 499-506
8 p.
artikel
86 New Approach for Testing and providing Security Mechanism for Embedded Systems Karmore, Swapnili P.
2016
78 C p. 851-858
8 p.
artikel
87 Novel Framework for Efficient Data Transfer (EDT) Nagwanshi, Kapil Kumar
2016
78 C p. 153-159
7 p.
artikel
88 On Privacy and Security in Social Media – A Comprehensive Study Senthil Kumar N,
2016
78 C p. 114-119
6 p.
artikel
89 Optimal Cluster Head Selection Based Energy Efficient Technique for Defending against Gray Hole and Black Hole Attacks in Wireless Sensor Networks Dongare, Snehal P.
2016
78 C p. 423-430
8 p.
artikel
90 Optimal Path Selection Criteria for Multipath Optical Wireless Communication Link Dhore, Jayshree
2016
78 C p. 660-666
7 p.
artikel
91 Orange Sorting by Applying Pattern Recognition on Colour Image Jhawar, Jyoti
2016
78 C p. 691-697
7 p.
artikel
92 Performance Evaluation of Selection Methods of Genetic Algorithm and Network Security Concerns Pandey, Hari Mohan
2016
78 C p. 13-18
6 p.
artikel
93 Placement of Security Devices in Cloud Data Centre Network: Analysis and Implementation Majhi, Santosh Kumar
2016
78 C p. 33-39
7 p.
artikel
94 Power and Fault Aware Reliable Resource Allocation for Cloud Infrastructure Gupta, Punit
2016
78 C p. 457-463
7 p.
artikel
95 Power & Load Aware Resource Allocation Policy for Hybrid Cloud Jha, Ravi Shankar
2016
78 C p. 350-357
8 p.
artikel
96 Preface Bhatnagar, Vishal
2016
78 C p. 1-4
4 p.
artikel
97 Privacy Preserving Unstructured Big Data Analytics: Issues and Challenges Mehta, Brijesh B.
2016
78 C p. 120-124
5 p.
artikel
98 Quality Of Service Approach For IPS Using RSS and Directional Antenna Potgantwar, Amol D.
2016
78 C p. 447-456
10 p.
artikel
99 Resolving Problems Based on Peer to Peer Network Security Issue's Wararkar, Pravin
2016
78 C p. 652-659
8 p.
artikel
100 Respiratory Mask Selection and Leakage Detection System Based on Canny Edge Detection Operator Ingle, Mayur A.
2016
78 C p. 323-329
7 p.
artikel
101 Review on Detection and Mitigation of Sybil Attack in the Network Bhise, Arpita M.
2016
78 C p. 395-401
7 p.
artikel
102 Risk Weighted Social Trust Index for Online Social Networks Lalchandani, Jayprakash
2016
78 C p. 307-313
7 p.
artikel
103 Role of Diameter Based Protocol in enhancing of new and Upcoming Technologies Vinay Kumar S.B.,
2016
78 C p. 415-422
8 p.
artikel
104 SAMIKSHA - Sentiment Based Product Review Analysis System Potdar, Aarti
2016
78 C p. 513-520
8 p.
artikel
105 Secret Sharing Based Visual Cryptography Scheme Using CMY Color Space Dahat, Ankush V.
2016
78 C p. 563-570
8 p.
artikel
106 Secure and Cost-effective Application Layer Protocol with Authentication Interoperability for IOT Chavan, Ajit A.
2016
78 C p. 646-651
6 p.
artikel
107 Secure Localisation of Wireless Devices with Application to Sensor Networks using Steganography Tondwalkar, Ankita
2016
78 C p. 610-616
7 p.
artikel
108 Selective & Secured Code Distribution Approach for Multihop Wireless Sensor Networks Gulhane, Veena
2016
78 C p. 859-866
8 p.
artikel
109 Sentence Boundary Detection For Marathi Language Wanjari, Nagmani
2016
78 C p. 550-555
6 p.
artikel
110 Spectral Efficiency Improving Techniques in Mobile Femtocell Network: Survey Paper Tayade, Sudhanshu N.
2016
78 C p. 734-739
6 p.
artikel
111 Survey on Algorithms for Efficient Cluster Formation and Cluster Head Selection in MANET Gavhale, Mrunal
2016
78 C p. 477-482
6 p.
artikel
112 Symmetric Key Encryption Technique: A Cellular Automata based Approach in Wireless Sensor Networks Roy, Satyabrata
2016
78 C p. 408-414
7 p.
artikel
113 Text Mining Using Metadata for Generation of Side Information Bhanuse, Shraddha S.
2016
78 C p. 807-814
8 p.
artikel
114 The Impact Assessment of IT Infrastructure on Information Security: A Survey Report Shrivastava, Ankur Kumar
2016
78 C p. 314-322
9 p.
artikel
115 Threat Modelling of Virtual Machine Migration Auction Majhi, Santosh Kumar
2016
78 C p. 107-113
7 p.
artikel
116 Transliteration of Secured SMS to Indian Regional Language Sapkal, Krutika
2016
78 C p. 748-755
8 p.
artikel
117 Tree Representation: Knowledge Discovery from Uncertain Data Rani, K. Swarupa
2016
78 C p. 683-690
8 p.
artikel
118 Triplicative Cipher Technique Johari, Rahul
2016
78 C p. 217-223
7 p.
artikel
119 UML Based Modeling for Data Aggregation in Secured Wireless Sensor Network Uke, Shailaja
2016
78 C p. 706-713
8 p.
artikel
120 Usability Determination Using Multistage Fuzzy System Gupta, Deepak
2016
78 C p. 263-270
8 p.
artikel
121 User Profiling for University Recommender System Using Automatic Information Retrieval Kanoje, Sumitkumar
2016
78 C p. 5-12
8 p.
artikel
122 Video Partitioning and Secured Keyframe Extraction of MPEG Video Thakre, K.S.
2016
78 C p. 790-798
9 p.
artikel
                             122 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland