Authors : Anu Chalil, , J. Merin Philip
Publisher :IEEE National Conference on Electrical & Electronics Engineering
Authors : Dr. Manazhy Reshmi, P. Sankaran
Publisher :Eighth International Conference on Data Mining and Warehousing (ICDMW 2014),
Authors : T. S. Angel, , U. M
Publisher :proc.of International Conference on Computing of Power, Energy & Communication- ICCPEIC -2014
Authors : Dr. Thangam S.;, Ezra, Kirubakaran; , William, J.
Publisher :Asian Journal of Information Technology
Authors : Dr. Prakash G.;, Sakthivel S.
Publisher :Currently researchers are focusing on the techniques that could withstand and prevent the user’s secret data from the attacks. Cryptographic Smart cards are vulnerable to traditional mathematical attacks that exploit defects in cryptographic algorithms. H,
Authors : Arunkumar S., Raghu V Prakash
Authors : Raushan Kumar , Anoop K. Dass
Publisher :5th International and 41st National Conference on Fluid Mechanics and Fluid Power,
Authors : Balaji K., M. M. S. R. S., B, Dr. Ratna Kishore V., ; Dr. Anbuudayasankar S. P
Publisher :International Conference for Energy and Environment
Authors : Vivek S , Veena Suresh
Publisher :5th international conference on life skill education
Authors : Arindam Sadhu; , Dr. Pritam Bhattacharjee
Publisher :Journal of VLSI Design Tool & Technology,
Authors : Dr. Pritam Bhattacharjee;, Arindam Sadhu
Publisher :Journal of Electronic Design Technology
Authors : Arindam Sadhu; , Arindam Sadhu; , Sabnam Koley, Sabnam Koley, Dr. Pritam Bhattacharjee; , Dr. Pritam Bhattacharjee;
Publisher :Journal of VLSI Design Tools and Technology