Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks Journal title: International Journal of Science Engineering and Advance Technology Authors: N. Vijaya Bharatha Lakshmi| M.Tech (CSE), VIGNAN’s NIRULA Institute of technology and science for wo... Subject(s): Engineering, Medicine, Social Sciences, Pharmacy
Message Endorsement and Informant Confidentiality In Wireless Set of Connections Journal title: International Journal of Science Engineering and Advance Technology Authors: Krishna priya.K| Student of M.Tech (CSE) and Department of Computer Science and Engineering, GVR&S C... Subject(s): Engineering, Medicine, Social Sciences, Pharmacy
Ensuring Semantic Security in Keyword Search using Searchable Public-Key Ciphertexts with Hidden Structures Journal title: International Journal of Science Engineering and Advance Technology Authors: P Gnana Iswarya| M.Tech (CSE), Dhanekula Institute of Engineering & Technology, A.P., India, P Sunit... Subject(s): Engineering, Medicine, Social Sciences, Pharmacy
Generating Content Searchable Cipher Texts with Semantic Security Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Pondkule Priyanka, Yadav Ashwini, Khomane Sharmila, Nale Supriya Subject(s): Engineering, Applied Linguistics
Ensuring Data Sender Privacy And Reduce Communication&Computation Overhead In WSN Journal title: International Journal of Research in Computer and Communication Technology Authors: M Aruna Sri, Beebi Sufia Sheik Subject(s): Computer and Information Science, Telecommunications
Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach Journal title: International Journal on Computer Science and Engineering Authors: Md.Headayetullah , G.K. Pradhan Subject(s):
Generation of Addition Chain using Deterministic Division Based Method Journal title: International Journal of Computer Science & Engineering Technology Authors: Mr. K. Mani Subject(s):
Joint Operation in Public Key Cryptography Journal title: International Journal of Advanced Computer Science & Applications Authors: Dragan Vidakovic , Olivera Nikolic , Jelena Kaljevic , Dusko Parezanovic Subject(s):
An Improved Montgomery’s Method Over Public-Key Cryptosystem Journal title: International Journal of Computer Science & Engineering Technology Authors: GVS Raj Kumar , Lagadapati Maanasa , K.Naveen Kumar , P.Chandra Sekhar , Mahesh Kasula Subject(s):
Exploration Encryption Mechanism Using Single Key for Public Cloud Storage Journal title: International journal of Emerging Trends in Science and Technology Authors: Abhilash T P Subject(s):
Code-Based Public-Key Cryptosystems: the current state, the existing contradictions and prospects of practical use for the post-quantum period Journal title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА Authors: Alexandr Kuznetsov, Andriy Pushkar’ov, Sergii Kavun, Vyacheslav Kalashnikov Subject(s):
Asymmetric cryptography and trapdoor one-way functions Journal title: Automatyka Authors: Natalia Krzyworzeka Subject(s):
Dynamic Authentication Protocol for Mobile Networks Using Public-Key Cryptography Journal title: International Journal of Science and Research (IJSR) Authors: Subject(s):
Efficient Data Sharing in Cloud Medium with Key Aggregate Cryptosystem Journal title: International Journal of Science and Research (IJSR) Authors: Subject(s):