Back close
Publications
Security Vulnerabilities in Open Source Projects: An India Perspective

Citation : K. Achuthan, S. SudhaRavi, R. Kumar and R. Raman, "Security vulnerabilities in open source projects: ...

Publisher :2nd International Conference on Information and Communication Technology (ICoICT).

Publications
Security Measures on Mobile Technology using Software Service

Publisher :International Journal of Science Research

Publications
Security in wireless sensor Networks in smart grids

Citation : R. N., V., V., and P., A. Archana., “Security in wireless sensor Networks in smart grids”, Inter ...

Publisher :International Journal of Applied Engineering and Research

Publications
Security and trust- new challenges to computing today in cyberspace

Publisher :2014 Seventh International Conference on Contemporary Computing (IC3)

Publications
Securing User Input As a Defense Against MitB

Publisher :Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing

Publications
Secure two-party computation with AES-128: Generic approach and exploiting specific properties of functions approach

Publisher :The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)

Publications
Secure Key Stream Generation using Computational Intelligence Techniques

Citation : Dr. S. Santhanalakshmi, Dr. K. Sangeeta Iyer, and Patra, G. K., “Secure Key Stream Generation usin ...

Publisher :Int. Journal Computer Technology Applications, Month and Year of Publication, ,

Publications
A Script Recognizer Independent Bi-lingual Character Recognition System for Printed English and Kannada Documents

Publisher :International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

Admissions Apply Now