Back close
Publications
Security and trust- new challenges to computing today in cyberspace

Publisher :2014 Seventh International Conference on Contemporary Computing (IC3)

Publications
Securing User Input As a Defense Against MitB

Publisher :Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing

Publications
Secure two-party computation with AES-128: Generic approach and exploiting specific properties of functions approach

Publisher :The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)

Publications
Secure Key Stream Generation using Computational Intelligence Techniques

Citation : Dr. S. Santhanalakshmi, Dr. K. Sangeeta Iyer, and Patra, G. K., “Secure Key Stream Generation usin ...

Publisher :Int. Journal Computer Technology Applications, Month and Year of Publication, ,

Publications
A Script Recognizer Independent Bi-lingual Character Recognition System for Printed English and Kannada Documents

Publisher :International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

Publications
Schur convexity and concavity of Gnan mean

Citation : K. M. Nagaraja, Dr. K. Murali, and Lokrsha, V., “Schur convexity and concavity of Gnan mean”, Pr ...

Publisher :Proceedings of the Jangjeon Mathematical Society

Publications
Schemes for Providing Routing Security in MANET – A Survey

Citation : A. S. and Dr. Supriya M., “Schemes for Providing Routing Security in MANET - A Survey”, in Inter ...

Publisher :International Conference on Recent Innovations in Electrical, Electronics, Computer and Mechanical Engineering (ICRIEECME 2014)

Admissions Apply Now