Blowfish Encryption Using Key Secured Block Based Transformation Journal title: International Journal of Engineering Sciences & Research Technology Authors: Mrs.Dhanashri M.Torgalkar Subject(s):
DATA STORAGE SECURITY IN CLOUD COMPUTING USING THIRD PARTY AUDITOR (TPA) Journal title: International Journal of Engineering Sciences & Research Technology Authors: Rahul K. Morghade Subject(s):
Key Policy Attribute Based Encryption in Cloud Storage Journal title: IOSR Journals (IOSR Journal of Computer Engineering) Authors: Prof. Dipa Dharmadhikari , Sonali Deshpande Subject(s):
Providing High Security and Recovering Good Quality Image using Visual Cryptographic Technique Journal title: IOSR Journals (IOSR Journal of Computer Engineering) Authors: Prasanna Kumar H R , Niranjan N Chiplunkar Subject(s):
CLASSICAL AND QUANTUM COMMUNICATIONS IN GRID COMPUTING Journal title: Journal of Science And Arts Authors: MIHAI OCTAVIAN DIMA, MARIAN PETRE, DORINA ARANGHEL, BOGDAN MITRICA, MIHNEA DULEA, CARMELIA PET... Subject(s): Chemistry, Mathematics, Physics, Analytical Chemistry, Inorganic Chemistry, Organic Chemistry, Physical Chemistry, Nuclear Physics, Science
Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz’s Method Journal title: International Journal on Computer Science and Engineering Authors: Padma Bh , D.Chandravathi , P.Prapoorna Roja Subject(s):
Secure Image Transmission Through Unreliable Channels Journal title: International Journal on Computer Science and Engineering Authors: P.VIJAYRAM REDDY , Dr.P. Mallesham , K.VENKATESH SHARMA , P. RADHADEVI Subject(s):
A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms Journal title: International Journal on Computer Science and Engineering Authors: Akanksha Mathur Subject(s):
A Novel Security Approach in Mobile Agent Using Encryption Journal title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com Authors: Nidhi Gupta , Dr. Anurag Dixit Subject(s):
A Thorough Investigation on Software Protection Techniques against Various Attacks Journal title: Bonfring International Journal of Software Engineering and Soft Computing Authors: Sasirekha N, Dr.M. Hemalatha Subject(s):
esign and Implementation of an Encryption and Decryption Using Non-Linear RM-PRNG Journal title: International Journal of Modern Engineering Research (IJMER) Authors: M Reddy Subject(s):
Robustness of RC4 against Differential attack Journal title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) Authors: Bhargvi H. Kamble , Dr. B. B. Meshram Subject(s):
CONSIDERATIONS ABOUT COMPUTER NETWORKS SECURITY UNDER VARIOUS OPERATING SYSTEMS Journal title: Journal of Applied Quantitative Methods Authors: Nicolae Radu MARSANU, Claudiu SICHITIU, George SICHITIU Subject(s):
Security in Body Sensor Networks for Healthcare applications Journal title: IOSR Journals (IOSR Journal of Computer Engineering) Authors: Mamalisa Nayak Subject(s):
A Brief Survey on Encryption Schemes in Cloud Environments Journal title: International Journal of Computer & organization Trends(IJCOT) Authors: S.M . Hema Latha , S.Ganesh Subject(s):