Legacy Authentication Methods Preventing Key logging Attacks

Journal title: International Journal of Science Engineering and Advance Technology

Authors: M.Vamsi Krishna| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India, K....

Subject(s): Engineering, Medicine, Social Sciences, Pharmacy

Key logging Prevention by QR code with Visual Authentication

Journal title: International Journal of Science Engineering and Advance Technology

Authors: Kodiyala Devi Sireesha| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: siree...

Subject(s): Engineering, Medicine, Social Sciences, Pharmacy

slugSec.AODV for MANETs using MD5 with Cryptography

Journal title: International Journal of Management, IT and Engineering

Authors: Mr. Suketu D. Nayak and Mr. Ravindra K. Gupta

Subject(s): Computer and Information Science, Engineering, Management Science, Development Studies

Spyware Detection Using Data Mining

Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET)

Authors: Karishma Pandey, Madhura Naik, Junaid Qamar, Mahendra Patil

Subject(s): Engineering, Applied Linguistics

A Mechanism To Detect The Selfish Nodes

Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET)

Authors: E.Divya Kalyani, Dr. S. Kirubakaran, K. Maheswari

Subject(s): Engineering, Applied Linguistics

Efficient Spam Detection on Social Network

Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET)

Authors: Girisha Khurana, Mr Lalit Kumar

Subject(s): Engineering, Applied Linguistics

Rajeswari A. R, Kulothungan K, Ganapathy S, Kannan A

Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET)

Authors: Rajeswari A. R, Kulothungan K, Ganapathy S, Kannan A

Subject(s): Engineering, Applied Linguistics

Article processing charges

Type

License

Index