SRWD Technique for Security Enhancement of Audio Steganography Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Deepa Verma, Mr. Pushpendra Singh Subject(s): Engineering, Applied Linguistics
ELLIPTIC CURVE CRYPTOGRAPHY WITH SECURE TEXT BASED CRYPTOSYSTEM Journal title: International Journal of Engineering, Science and Mathematics Authors: Anju Gera, Dr. Ashutosh Dixit and Sonia Saini Subject(s): Engineering, Mathematics
Four Stage Encryption Journal title: International Journal of Research in Computer and Communication Technology Authors: Gomatam Venkata Sudarsan Acharyulu, Sangapu V Appaji Subject(s): Computer and Information Science, Telecommunications
Analysis of Four Stage Encryption Journal title: International Journal of Research in Computer and Communication Technology Authors: Dr. Gomatam V S Acharyulu, Sangapu V Appaji Subject(s): Computer and Information Science, Telecommunications
Three-Party Authenticated Quantum Key Distribution Protocols based Security in WLANs Journal title: International Journal of Research in Computer and Communication Technology Authors: V V S NARAYANA MURTHY KAMINI, Amudala Ratna Raju, M Vamsi Krishna Subject(s): Computer and Information Science, Telecommunications
Transient Authentication Journal title: International Journal of Research in Computer and Communication Technology Authors: snehal krupacharya shahane, Arati Shitole, Tinu Rathi, Aparna Rajegaonkar, Sushila Shelake Subject(s): Computer and Information Science, Telecommunications
An Efficient Method for Steganography in Videos Journal title: International Journal of Research in Computer and Communication Technology Authors: N. Sarath Babu, Dr. M. Sailaja Subject(s): Computer and Information Science, Telecommunications
THE SECURED ANTI PHISHING APPROACH USING IMAGE BASED VALIDATION Journal title: International Journal of Research in Computer and Communication Technology Authors: Y.Yesu Jyothi, D. Srinivas, K. Govindaraju Subject(s): Computer and Information Science, Telecommunications
Authentication Token as SSO Devices Journal title: International Journal of Research in Computer and Communication Technology Authors: Praveen Kumar Maheshwari, Ajay Palmure, Bharati S. Ainapure Subject(s): Computer and Information Science, Telecommunications
Study of Cyber Threats and Data Encryption Techniques to Protect National Information Infrastructure Journal title: International Journal of Research in Computer and Communication Technology Authors: Prof. Prashant Laxminarayan Chintal Subject(s): Computer and Information Science, Telecommunications
Anti Phishing approach using Visual Cryptography and Iris Recognition Journal title: International Journal of Research in Computer and Communication Technology Authors: Saranya Shaji , Gripsy Paul Subject(s): Computer and Information Science, Telecommunications
Minimizing Network Overhead In MANET Using Elliptic Curve Cryptography Journal title: International Journal of Research in Computer and Communication Technology Authors: B.Santhi Sri, C.Subash Chandra, G.Aruna Rekha Subject(s): Computer and Information Science, Telecommunications
An Advanced Anti Phishing Approach Based On Two-Tier Validation Journal title: International Journal of Research in Computer and Communication Technology Authors: P P N G Phani Kumar, R John Mathew Subject(s): Computer and Information Science, Telecommunications
A Cryptographic Based Implementation Of Secure Hash Algorithm By Using Microblaze Processor Journal title: International Journal of Research in Computer and Communication Technology Authors: Balu Srinivas Jangareddi, G. Sridevi Subject(s): Computer and Information Science, Telecommunications
Analysis of Rabin and RSA Cryptosystems Using Bit Shifting and Stuffing (BSS) Technique Journal title: International Journal of Research in Computer and Communication Technology Authors: Rakesh Nayak, Ch. VeerendraKumar Subject(s): Computer and Information Science, Telecommunications