Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • Hybrid Cryptographic Technique Using RSA Algorithm and Scheduling Concepts
  • Meenakshi Shankar and Akshaya.P
  • Software Engineering & Security
  • 6, 6, November, 2014

  • Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data Using Secure Division
  • Sumana M
  • Software Engineering & Security
  • 6, 6, November, 2014

  • A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
  • Subarna Adhikari, Sushil Nepal and Rabindra Bista
  • Software Engineering & Security
  • Volume 14, 6, November, 2022

  • A Cryptographic Mutual Authentication Scheme for Web Applications
  • Yassine Sadqi, Ahmed Asimi and Younes Asimi
  • Software Engineering & Security
  • 6, 6, November, 2014

  • A Framework for the Detection of Banking Trojans in Android
  • Subarna Adhikari, Sushil Nepal and Rabindra Bista
  • Software Engineering & Security
  • 14, 6, November, 2022

  • Cloud Based Access Control Model for Selective Encryption of Documents with Traitor Detection
  • Punya Peethambaran and. Jayasudha J. S
  • Software Engineering & Security
  • 5, 6, September, 2014

  • A Novel (K,N) Secret Sharing Scheme from Quadratic Residues for Grayscale Images
  • El-Tigani B. Abdelsatir, Sahar Salahaldeen, Hyam Omar and Afra Hashim
  • Software Engineering & Security
  • 6, 4, July, 2014

  • An Extended Security Measurement Framework for Open-Source Enterprise Resource Planning Software Security
  • Jane Wanjiru Njuki, Geoffrey Muchiri Muketha and John Gichuki Ndia
  • Software Engineering & Security
  • 14, 5, September, 2022

  • Encryption Modes Identification of Block Ciphers based on Machine Learning
  • Ruiqi Xia
  • Software Engineering & Security
  • 14, 5, September, 2022

  • State of Mobile Banking in Tanzania and Security Issues
  • Bossi Masamila
  • Software Engineering & Security
  • 6, 4, July, 2014

  • An Intelligent Food Inventory Monitoring System using Machine Learning and Computer Vision
  • Tianyu Li, Yu Sun
  • Software Engineering & Security
  • 12, 15, September, 2022

  • Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based on Various File Features
  • Ranjeet Masram, Vivek Shahare, Jibi Abraham, Rajni Moona
  • Software Engineering & Security
  • 6, 4, July, 2014

  • Analysis of RSA Algorithm using GPU Programming
  • Sonam Mahajan
  • Software Engineering & Security
  • 6, 4, July, 2014

  • Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes
  • Divya Ann Luke
  • Software Engineering & Security
  • 6, 3, May, 2014

  • Distributed Denial of Service Attack Detection and Prevention Model for IoT based Computing Environment using Ensemble Machine Learning Approach
  • Nicholas Oluwole Ogini
  • Software Engineering & Security
  • 14, 4, July, 2022

  • Role of Integrated Virtual E-Learning System for Distance Learning Students
  • Shweta Soni
  • Software Engineering & Security
  • 6, 3, May, 2014

  • A Survey of Trends in Massive DDOS Attacks and Cloud-Based Mitigations
  • FuiFui Wong
  • Software Engineering & Security
  • 6, 3, May, 2014

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals