Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
Hybrid Cryptographic Technique Using RSA Algorithm and Scheduling Concepts
Meenakshi Shankar and Akshaya.P
Software Engineering & Security
6, 6, November, 2014
Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data Using Secure Division
Sumana M
Software Engineering & Security
6, 6, November, 2014
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
Subarna Adhikari, Sushil Nepal and Rabindra Bista
Software Engineering & Security
Volume 14, 6, November, 2022
A Cryptographic Mutual Authentication Scheme for Web Applications
Yassine Sadqi, Ahmed Asimi and Younes Asimi
Software Engineering & Security
6, 6, November, 2014
A Framework for the Detection of Banking Trojans in Android
Subarna Adhikari, Sushil Nepal and Rabindra Bista
Software Engineering & Security
14, 6, November, 2022
Cloud Based Access Control Model for Selective Encryption of Documents with Traitor Detection
Punya Peethambaran and. Jayasudha J. S
Software Engineering & Security
5, 6, September, 2014
A Novel (K,N) Secret Sharing Scheme from Quadratic Residues for Grayscale Images
El-Tigani B. Abdelsatir, Sahar Salahaldeen, Hyam Omar and Afra Hashim
Software Engineering & Security
6, 4, July, 2014
An Extended Security Measurement Framework for Open-Source Enterprise Resource Planning Software Security
Jane Wanjiru Njuki, Geoffrey Muchiri Muketha and John Gichuki Ndia
Software Engineering & Security
14, 5, September, 2022
Encryption Modes Identification of Block Ciphers based on Machine Learning
Ruiqi Xia
Software Engineering & Security
14, 5, September, 2022
State of Mobile Banking in Tanzania and Security Issues
Bossi Masamila
Software Engineering & Security
6, 4, July, 2014
An Intelligent Food Inventory Monitoring System using Machine Learning and Computer Vision
Tianyu Li, Yu Sun
Software Engineering & Security
12, 15, September, 2022
Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based on Various File Features
Ranjeet Masram, Vivek Shahare, Jibi Abraham, Rajni Moona
Software Engineering & Security
6, 4, July, 2014
Analysis of RSA Algorithm using GPU Programming
Sonam Mahajan
Software Engineering & Security
6, 4, July, 2014
Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes
Divya Ann Luke
Software Engineering & Security
6, 3, May, 2014
Distributed Denial of Service Attack Detection and Prevention Model for IoT based Computing Environment using Ensemble Machine Learning Approach
Nicholas Oluwole Ogini
Software Engineering & Security
14, 4, July, 2022
Role of Integrated Virtual E-Learning System for Distance Learning Students
Shweta Soni
Software Engineering & Security
6, 3, May, 2014
A Survey of Trends in Massive DDOS Attacks and Cloud-Based Mitigations
FuiFui Wong
Software Engineering & Security
6, 3, May, 2014
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24