nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish
|
Patil, Priyadarshini |
|
2016 |
78 |
C |
p. 617-624 8 p. |
artikel |
2 |
A Critical Analysis of Energy Efficient Virtual Machine Placement Techniques and its Optimization in a Cloud Computing Environment
|
Choudhary, Ankita |
|
2016 |
78 |
C |
p. 132-138 7 p. |
artikel |
3 |
A Current Study on the Limitations of Agile Methods in Industry Using Secure Google Forms
|
Agrawal, Ashish |
|
2016 |
78 |
C |
p. 291-297 7 p. |
artikel |
4 |
Adaptive Lossless Medical Image Watermarking Algorithm Based on DCT & DWT
|
Mehto, Amit |
|
2016 |
78 |
C |
p. 88-94 7 p. |
artikel |
5 |
Adaptive Selection of Cryptographic Protocols in Wireless Sensor Networks using Evolutionary Game Theory
|
Arora, Srishti |
|
2016 |
78 |
C |
p. 358-366 9 p. |
artikel |
6 |
Advanced Automated Module for Smart and Secure City
|
Solanki, Vijender Kumar |
|
2016 |
78 |
C |
p. 367-374 8 p. |
artikel |
7 |
A Dynamic Data Replication in Grid System
|
Warhade, Sonali |
|
2016 |
78 |
C |
p. 537-543 7 p. |
artikel |
8 |
A Keyless Approach for RDH in Encrypted Images using Visual Cryptography
|
Ansari Miss., Nuzhat |
|
2016 |
78 |
C |
p. 125-131 7 p. |
artikel |
9 |
A Multilayered Secure Scheme for Transmission of Sensitive Information based on Steganalysis
|
D'Souza, Divya Jennifer |
|
2016 |
78 |
C |
p. 375-381 7 p. |
artikel |
10 |
Analysis of K-Means and K-Medoids Algorithm For Big Data
|
Arora, Preeti |
|
2016 |
78 |
C |
p. 507-512 6 p. |
artikel |
11 |
Android Applications Repackaging Detection Techniques for Smartphone Devices
|
Rastogi, Sajal |
|
2016 |
78 |
C |
p. 26-32 7 p. |
artikel |
12 |
A New Approach for Video Steganography Based on Randomization and Parallelization
|
Sudeepa K.B., |
|
2016 |
78 |
C |
p. 483-490 8 p. |
artikel |
13 |
A Novel Algorithmic Approach for an Automatic Data Placement for NUMA Based Design
|
Madarkar, Jitendra |
|
2016 |
78 |
C |
p. 276-283 8 p. |
artikel |
14 |
A Novel Approach for Fault Tolerance Control System and Embedded System Security
|
Khadse, Tushar S. |
|
2016 |
78 |
C |
p. 799-806 8 p. |
artikel |
15 |
A Novel Graph Centrality Based Approach to Analyze Anomalous Nodes with Negative Behavior
|
Kaur, Ravneet |
|
2016 |
78 |
C |
p. 556-562 7 p. |
artikel |
16 |
Anti-Hijack: Runtime Detection of Malware Initiated Hijacking in Android
|
Shankar, Venkatesh Gauri |
|
2016 |
78 |
C |
p. 587-594 8 p. |
artikel |
17 |
A Partition Based Novel Approach in AFIS for Forensics & Security
|
Shrivastava, Ankit |
|
2016 |
78 |
C |
p. 771-776 6 p. |
artikel |
18 |
Appropriate Channel Selection for Data Transmission in Cognitive Radio Networks
|
Moon, Minal S. |
|
2016 |
78 |
C |
p. 838-844 7 p. |
artikel |
19 |
A Probabilistic Gossip-based Secure Protocol for Unstructured P2P Networks
|
Srivastava, Anubhava |
|
2016 |
78 |
C |
p. 595-602 8 p. |
artikel |
20 |
A Review on Noisy Password, Voiceprint Biometric and One-Time-Password
|
Kumbhare, Komal K. |
|
2016 |
78 |
C |
p. 382-386 5 p. |
artikel |
21 |
A Review on Security Related Aspects in Vehicular Adhoc Networks
|
Kaur, Navjot |
|
2016 |
78 |
C |
p. 387-394 8 p. |
artikel |
22 |
A Review on the Various Security Techniques for VANETs
|
Singh, Amandeep |
|
2016 |
78 |
C |
p. 284-290 7 p. |
artikel |
23 |
A Review on Video Security Using Visual Cryptosystem
|
Gadicha Mr., Ajay B. |
|
2016 |
78 |
C |
p. 729-733 5 p. |
artikel |
24 |
A Review Over Genetic Algorithm and Application of Wireless Network Systems
|
Shahi, Bimlendu |
|
2016 |
78 |
C |
p. 431-438 8 p. |
artikel |
25 |
A Secure Authentication Scheme for RFID Systems
|
Dass, Prajnamaya |
|
2016 |
78 |
C |
p. 100-106 7 p. |
artikel |
26 |
A Study on Security Vulnerability on Cloud Platforms
|
Majhi, Santosh Kumar |
|
2016 |
78 |
C |
p. 55-60 6 p. |
artikel |
27 |
A Survey of Virtual Machine Placement Techniques in a Cloud Data Center
|
Usmani, Zoha |
|
2016 |
78 |
C |
p. 491-498 8 p. |
artikel |
28 |
A Survey on Keypoint Based Copy-paste Forgery Detection Techniques
|
Warbhe, Anil Dada |
|
2016 |
78 |
C |
p. 61-67 7 p. |
artikel |
29 |
A Survey on Scheduling Schemes with Security in Wireless Sensor Networks
|
Mahidhar, Rashmi |
|
2016 |
78 |
C |
p. 756-762 7 p. |
artikel |
30 |
Authorized Deduplication: An Approach for Secure Cloud Environment
|
Waghmare, Vivek |
|
2016 |
78 |
C |
p. 815-823 9 p. |
artikel |
31 |
Authorship Verification of Online Messages for Forensic Investigation
|
Nirkhi, Smita |
|
2016 |
78 |
C |
p. 640-645 6 p. |
artikel |
32 |
Automated Discovery of JavaScript Code Injection Attacks in PHP Web Applications
|
Gupta, Shashank |
|
2016 |
78 |
C |
p. 82-87 6 p. |
artikel |
33 |
Boolean Signatures for Metamorphic Malware
|
Ranjan, Aditya Kaushal |
|
2016 |
78 |
C |
p. 255-262 8 p. |
artikel |
34 |
Cascade Forward Back-propagation Neural Network Based Group Authentication Using (n, n) Secret Sharing Scheme
|
Narad, Supriya |
|
2016 |
78 |
C |
p. 185-191 7 p. |
artikel |
35 |
Cellular Network Fraud & Security, Jamming Attack and Defenses
|
Hiremath, Rupa |
|
2016 |
78 |
C |
p. 233-240 8 p. |
artikel |
36 |
Cluster Based Wireless Mobile Healthcare System for Physiological Data Monitoring
|
Tambe, Sagar B. |
|
2016 |
78 |
C |
p. 40-47 8 p. |
artikel |
37 |
Comparative Analysis of Authenticated Key Agreement Protocols Based on Elliptic Curve Cryptography
|
Nimbhorkar, Sonali |
|
2016 |
78 |
C |
p. 824-830 7 p. |
artikel |
38 |
Computationally Efficient Digital Image Forensic Method for Image Authentication
|
Warbhe, Anil Dada |
|
2016 |
78 |
C |
p. 464-470 7 p. |
artikel |
39 |
Computation of Various QoS Parameters for FiWi Access Network
|
Upadhyay, Raksha |
|
2016 |
78 |
C |
p. 172-178 7 p. |
artikel |
40 |
Contents
|
|
|
2016 |
78 |
C |
p. iii-vi nvt p. |
artikel |
41 |
Controlled Broadcast Protocol for Location Privacy in Mobile Applications
|
Jagdale, B.N. |
|
2016 |
78 |
C |
p. 782-789 8 p. |
artikel |
42 |
Crime Data Analysis Using Pig with Hadoop
|
Jain, Arushi |
|
2016 |
78 |
C |
p. 571-578 8 p. |
artikel |
43 |
Critical Study of Performance Parameters on Distributed File Systems Using MapReduce
|
Vaidya, Madhavi |
|
2016 |
78 |
C |
p. 224-232 9 p. |
artikel |
44 |
Crowdsourcing Software Development: Many Benefits Many Concerns
|
Hasteer, Nitasha |
|
2016 |
78 |
C |
p. 48-54 7 p. |
artikel |
45 |
Cryptanalysis of Zuhua Shao key Authentication Scheme
|
Kumaraswamy, P. |
|
2016 |
78 |
C |
p. 95-99 5 p. |
artikel |
46 |
Cryptic Mining for Automatic Variable Key Based Cryptosystem
|
Prajapat, Shaligram |
|
2016 |
78 |
C |
p. 199-209 11 p. |
artikel |
47 |
Cryptographic Key Protection in a Cryptoprocessor
|
Rajitha, N. |
|
2016 |
78 |
C |
p. 271-275 5 p. |
artikel |
48 |
Cyber Physical Systems & Public Utility in India: State of Art
|
Majhi, Santosh Kumar |
|
2016 |
78 |
C |
p. 777-781 5 p. |
artikel |
49 |
DDOS Attack Aware DSR Routing Protocol in WSN
|
Upadhyay, Raksha |
|
2016 |
78 |
C |
p. 68-74 7 p. |
artikel |
50 |
Dependency Analysis for Secured Code Level Parallelization
|
Jagtap, Vandana |
|
2016 |
78 |
C |
p. 831-837 7 p. |
artikel |
51 |
Design and Analysis of Real Time Video Processing Based on DWT Architecture for Mobile Robots
|
Naik, Pramod Kumar |
|
2016 |
78 |
C |
p. 544-549 6 p. |
artikel |
52 |
Design and Implementation of Trust Based Approach to Mitigate Various Attacks in Mobile Ad hoc Network
|
Dangare Mr., Nilesh N. |
|
2016 |
78 |
C |
p. 342-349 8 p. |
artikel |
53 |
Detection of Moving Objects in Surveillance Video by Integrating Bottom-up Approach with Knowledge Base
|
Aarthi R., |
|
2016 |
78 |
C |
p. 160-164 5 p. |
artikel |
54 |
Detection of Obfuscation in Java Malware
|
Kumar, Renuka |
|
2016 |
78 |
C |
p. 521-529 9 p. |
artikel |
55 |
Developing a Novel Technique for Face Liveness Detection
|
Fernandes Mr., Steven Lawrence |
|
2016 |
78 |
C |
p. 241-247 7 p. |
artikel |
56 |
Developing a Novel Technique to Match Composite Sketches with Images Captured by Unmanned Aerial Vehicle
|
Fernandes Mr., Steven Lawrence |
|
2016 |
78 |
C |
p. 248-254 7 p. |
artikel |
57 |
E-commerce Security through Elliptic Curve Cryptography
|
Ahmad, Khaleel |
|
2016 |
78 |
C |
p. 867-873 7 p. |
artikel |
58 |
Effective Cache Management and Pollution Reduction for Online Privacy
|
Joshi, Mayuri |
|
2016 |
78 |
C |
p. 722-728 7 p. |
artikel |
59 |
Efficient Keyword Search over Encrypted Cloud Data
|
Meharwade, Anuradha |
|
2016 |
78 |
C |
p. 139-145 7 p. |
artikel |
60 |
Empirical Analysis of Web Attacks
|
Kaur, Daljit |
|
2016 |
78 |
C |
p. 298-306 9 p. |
artikel |
61 |
Employing Speeded Scaled Conjugate Gradient Algorithm for Multiple Contiguous Feature Vector Frames: An Approach for Traffic Density State Estimation
|
Borkar, Prashant |
|
2016 |
78 |
C |
p. 740-747 8 p. |
artikel |
62 |
Energy Efficient Segmentation for Green FiWi network
|
Bhatt, Uma Rathore |
|
2016 |
78 |
C |
p. 75-81 7 p. |
artikel |
63 |
Establishment of Light Weight Cryptography for Resource Constraint Environment Using FPGA
|
Baskar, Chanthini |
|
2016 |
78 |
C |
p. 165-171 7 p. |
artikel |
64 |
Exponential Simplification Using Euler's and Fermat's Theorem
|
Mohan, Maya |
|
2016 |
78 |
C |
p. 714-721 8 p. |
artikel |
65 |
Future Weather Forecasting Using Soft Computing Techniques
|
Khajure, Sanjay |
|
2016 |
78 |
C |
p. 402-407 6 p. |
artikel |
66 |
Fuzzy Logic Based Image Encryption for Confidential Data Transfer Using (2, 2) Secret Sharing Scheme
|
Mudia Miss., Hinal M. |
|
2016 |
78 |
C |
p. 632-639 8 p. |
artikel |
67 |
Gesture Control Using Single Camera for PC
|
Lalithamani, N. |
|
2016 |
78 |
C |
p. 146-152 7 p. |
artikel |
68 |
GPS Based Distributed Communication Protocol for Static Sensor Network (GDCP)
|
Nighot, Mininath |
|
2016 |
78 |
C |
p. 530-536 7 p. |
artikel |
69 |
Grouping the Executables to Detect Malwares with High Accuracy
|
Sahay, Sanjay K. |
|
2016 |
78 |
C |
p. 667-674 8 p. |
artikel |
70 |
Hidden Biometric Security Implementation through Human Brain's Artificial Macro Structure
|
Maheshwari, Saurabh |
|
2016 |
78 |
C |
p. 625-631 7 p. |
artikel |
71 |
Image Bit Depth Plane Digital Watermarking for Secured Classified Image Data Transmission
|
Khandare, Shrinivas |
|
2016 |
78 |
C |
p. 698-705 8 p. |
artikel |
72 |
Information Retrieval System and Machine Translation: A Review
|
Madankar, Mangala |
|
2016 |
78 |
C |
p. 845-850 6 p. |
artikel |
73 |
Integrated ECC and Blowfish for Smartphone Security
|
Patel, Payal |
|
2016 |
78 |
C |
p. 210-216 7 p. |
artikel |
74 |
Issues in Achieving Complete Interoperability while Sharing Electronic Health Records
|
Bhartiya, Shalini |
|
2016 |
78 |
C |
p. 192-198 7 p. |
artikel |
75 |
Keyword Based Search and its Limitations in the Patent Document to Secure the Idea from its Infringement
|
Kumar, Ranjeet |
|
2016 |
78 |
C |
p. 439-446 8 p. |
artikel |
76 |
Legal Issues in Secure Implementation of Bring Your Own Device (BYOD)
|
Dhingra, Madhavi |
|
2016 |
78 |
C |
p. 179-184 6 p. |
artikel |
77 |
Mathematical Model of Security Framework for Routing Layer Protocol in Wireless Sensor Networks
|
Pathak, Ganesh R. |
|
2016 |
78 |
C |
p. 579-586 8 p. |
artikel |
78 |
Medicine Reminder and Monitoring System for Secure Health Using IOT
|
Zanjal, Samir V. |
|
2016 |
78 |
C |
p. 471-476 6 p. |
artikel |
79 |
Modified MASK Algorithm for Image Encryption
|
Wali, Heera G. |
|
2016 |
78 |
C |
p. 603-609 7 p. |
artikel |
80 |
Multi-layer Defense Against Malware Attacks on Smartphone Wi-Fi Access Channel
|
Sharma, Kavita |
|
2016 |
78 |
C |
p. 19-25 7 p. |
artikel |
81 |
Multilevel Secure RFID Based Object Tracking System
|
Bapat, Ajinkya C. |
|
2016 |
78 |
C |
p. 336-341 6 p. |
artikel |
82 |
Multimodal Fingerprint Spoof Detection Using White Light
|
Balaji, Aadhithya |
|
2016 |
78 |
C |
p. 330-335 6 p. |
artikel |
83 |
Multiple Applications Sharing for Effective Load Balancing in Secured Distributed Environment
|
Kimmatkar, Kavita |
|
2016 |
78 |
C |
p. 763-770 8 p. |
artikel |
84 |
Neural Network Approach to Iris Recognition in Noisy Environment
|
Hajari, Kamal |
|
2016 |
78 |
C |
p. 675-682 8 p. |
artikel |
85 |
Neural Network Pattern Classification and Weather Dependent Fuzzy Logic Model for Irrigation Control in WSN Based Precision Agriculture
|
Mohapatra, Ambarish G. |
|
2016 |
78 |
C |
p. 499-506 8 p. |
artikel |
86 |
New Approach for Testing and providing Security Mechanism for Embedded Systems
|
Karmore, Swapnili P. |
|
2016 |
78 |
C |
p. 851-858 8 p. |
artikel |
87 |
Novel Framework for Efficient Data Transfer (EDT)
|
Nagwanshi, Kapil Kumar |
|
2016 |
78 |
C |
p. 153-159 7 p. |
artikel |
88 |
On Privacy and Security in Social Media – A Comprehensive Study
|
Senthil Kumar N, |
|
2016 |
78 |
C |
p. 114-119 6 p. |
artikel |
89 |
Optimal Cluster Head Selection Based Energy Efficient Technique for Defending against Gray Hole and Black Hole Attacks in Wireless Sensor Networks
|
Dongare, Snehal P. |
|
2016 |
78 |
C |
p. 423-430 8 p. |
artikel |
90 |
Optimal Path Selection Criteria for Multipath Optical Wireless Communication Link
|
Dhore, Jayshree |
|
2016 |
78 |
C |
p. 660-666 7 p. |
artikel |
91 |
Orange Sorting by Applying Pattern Recognition on Colour Image
|
Jhawar, Jyoti |
|
2016 |
78 |
C |
p. 691-697 7 p. |
artikel |
92 |
Performance Evaluation of Selection Methods of Genetic Algorithm and Network Security Concerns
|
Pandey, Hari Mohan |
|
2016 |
78 |
C |
p. 13-18 6 p. |
artikel |
93 |
Placement of Security Devices in Cloud Data Centre Network: Analysis and Implementation
|
Majhi, Santosh Kumar |
|
2016 |
78 |
C |
p. 33-39 7 p. |
artikel |
94 |
Power and Fault Aware Reliable Resource Allocation for Cloud Infrastructure
|
Gupta, Punit |
|
2016 |
78 |
C |
p. 457-463 7 p. |
artikel |
95 |
Power & Load Aware Resource Allocation Policy for Hybrid Cloud
|
Jha, Ravi Shankar |
|
2016 |
78 |
C |
p. 350-357 8 p. |
artikel |
96 |
Preface
|
Bhatnagar, Vishal |
|
2016 |
78 |
C |
p. 1-4 4 p. |
artikel |
97 |
Privacy Preserving Unstructured Big Data Analytics: Issues and Challenges
|
Mehta, Brijesh B. |
|
2016 |
78 |
C |
p. 120-124 5 p. |
artikel |
98 |
Quality Of Service Approach For IPS Using RSS and Directional Antenna
|
Potgantwar, Amol D. |
|
2016 |
78 |
C |
p. 447-456 10 p. |
artikel |
99 |
Resolving Problems Based on Peer to Peer Network Security Issue's
|
Wararkar, Pravin |
|
2016 |
78 |
C |
p. 652-659 8 p. |
artikel |
100 |
Respiratory Mask Selection and Leakage Detection System Based on Canny Edge Detection Operator
|
Ingle, Mayur A. |
|
2016 |
78 |
C |
p. 323-329 7 p. |
artikel |
101 |
Review on Detection and Mitigation of Sybil Attack in the Network
|
Bhise, Arpita M. |
|
2016 |
78 |
C |
p. 395-401 7 p. |
artikel |
102 |
Risk Weighted Social Trust Index for Online Social Networks
|
Lalchandani, Jayprakash |
|
2016 |
78 |
C |
p. 307-313 7 p. |
artikel |
103 |
Role of Diameter Based Protocol in enhancing of new and Upcoming Technologies
|
Vinay Kumar S.B., |
|
2016 |
78 |
C |
p. 415-422 8 p. |
artikel |
104 |
SAMIKSHA - Sentiment Based Product Review Analysis System
|
Potdar, Aarti |
|
2016 |
78 |
C |
p. 513-520 8 p. |
artikel |
105 |
Secret Sharing Based Visual Cryptography Scheme Using CMY Color Space
|
Dahat, Ankush V. |
|
2016 |
78 |
C |
p. 563-570 8 p. |
artikel |
106 |
Secure and Cost-effective Application Layer Protocol with Authentication Interoperability for IOT
|
Chavan, Ajit A. |
|
2016 |
78 |
C |
p. 646-651 6 p. |
artikel |
107 |
Secure Localisation of Wireless Devices with Application to Sensor Networks using Steganography
|
Tondwalkar, Ankita |
|
2016 |
78 |
C |
p. 610-616 7 p. |
artikel |
108 |
Selective & Secured Code Distribution Approach for Multihop Wireless Sensor Networks
|
Gulhane, Veena |
|
2016 |
78 |
C |
p. 859-866 8 p. |
artikel |
109 |
Sentence Boundary Detection For Marathi Language
|
Wanjari, Nagmani |
|
2016 |
78 |
C |
p. 550-555 6 p. |
artikel |
110 |
Spectral Efficiency Improving Techniques in Mobile Femtocell Network: Survey Paper
|
Tayade, Sudhanshu N. |
|
2016 |
78 |
C |
p. 734-739 6 p. |
artikel |
111 |
Survey on Algorithms for Efficient Cluster Formation and Cluster Head Selection in MANET
|
Gavhale, Mrunal |
|
2016 |
78 |
C |
p. 477-482 6 p. |
artikel |
112 |
Symmetric Key Encryption Technique: A Cellular Automata based Approach in Wireless Sensor Networks
|
Roy, Satyabrata |
|
2016 |
78 |
C |
p. 408-414 7 p. |
artikel |
113 |
Text Mining Using Metadata for Generation of Side Information
|
Bhanuse, Shraddha S. |
|
2016 |
78 |
C |
p. 807-814 8 p. |
artikel |
114 |
The Impact Assessment of IT Infrastructure on Information Security: A Survey Report
|
Shrivastava, Ankur Kumar |
|
2016 |
78 |
C |
p. 314-322 9 p. |
artikel |
115 |
Threat Modelling of Virtual Machine Migration Auction
|
Majhi, Santosh Kumar |
|
2016 |
78 |
C |
p. 107-113 7 p. |
artikel |
116 |
Transliteration of Secured SMS to Indian Regional Language
|
Sapkal, Krutika |
|
2016 |
78 |
C |
p. 748-755 8 p. |
artikel |
117 |
Tree Representation: Knowledge Discovery from Uncertain Data
|
Rani, K. Swarupa |
|
2016 |
78 |
C |
p. 683-690 8 p. |
artikel |
118 |
Triplicative Cipher Technique
|
Johari, Rahul |
|
2016 |
78 |
C |
p. 217-223 7 p. |
artikel |
119 |
UML Based Modeling for Data Aggregation in Secured Wireless Sensor Network
|
Uke, Shailaja |
|
2016 |
78 |
C |
p. 706-713 8 p. |
artikel |
120 |
Usability Determination Using Multistage Fuzzy System
|
Gupta, Deepak |
|
2016 |
78 |
C |
p. 263-270 8 p. |
artikel |
121 |
User Profiling for University Recommender System Using Automatic Information Retrieval
|
Kanoje, Sumitkumar |
|
2016 |
78 |
C |
p. 5-12 8 p. |
artikel |
122 |
Video Partitioning and Secured Keyframe Extraction of MPEG Video
|
Thakre, K.S. |
|
2016 |
78 |
C |
p. 790-798 9 p. |
artikel |