Browsing by Keyword Authentication

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 56  next >
Upload DateTitleResearcherGuide(s)
9-Mar-2020A Cascaded Toolkit for Secure Data TransmissionDas RamkrishnaDutta Saurabh
14-Mar-2018A credential based authentication approach for securing data in cloudArya, Pradeep KumarSelvamani, K
23-Oct-2023An enhanced key management schemes for secure group communicationParthasarathi PShankar S
14-Mar-2018An improved hybrid authenticated trust system for clustered wireless sensor networks in military applicationsR, SivakumarS, Duraisamy
10-Sep-2021An investigation and design of post quantum privacy preserving signaturesThanalakshmi, PAnitha, R
26-Apr-2021Authenticated encryption for memory constrained devicesAgrawal, MeghaChang, Donghoon and Somitra, Sanadhya
19-Oct-2016Authentication schemes using smart card for secure communicationMarimuthu, KSravannan, R
30-Dec-2016Authentication using IRIS pseudo textures based fuzzy vaultReddy, E SreenivasaBabu, I Ramesh
21-Dec-2023Bioanalytical approach to standardize plant having anti inflammatory activityRane, Nilan JaisinghVaidya, Vikas V
14-Nov-2017Biometric authentication and pin distribution based architecture for secure mobile commerce applicationsR, Arun PrakashMehata, K M
1-Aug-2019Centralized and decentralized trust based security schemes for manetPrathapchandran, KSivagurunathan, S
16-Nov-2017Certain computational intelligent techniques for classification authentication and indexing of lung computed tomography imagesI, Jasmine Selvakumari JeyaDeepa, S N
19-Oct-2020Certain investigations on touch dynamics for user authentication on touch screen mobile devicesSenthil Prabha RVidhyapriya R
23-Mar-2017Certain investigations on transform based techniques in palmprint and finger knuckle print biometrics for human authenticationMahesh Kumar, N. B.Premalatha, K.
25-Jan-2016Certificate less multifactor authentication schemes for secure grid environmentJaspher Willsie Kathrine, GKirubakaran, E and Blessing, R Elijah
21-Oct-2016Content based watermarking for image authenticationLatha, BAnbumani, K
12-Sep-2018Cybercrime case study of security incidents on internetPathak, Pradeep BalkrishnaKalyankar, N V
14-Sep-2022Data security and authentication using steganographyB. Ravi KumarMurti P.R.K
23-Jan-2024Design and Analysis of Blockchain Based Data Security Protocols with Authentication MechanismDwivedi, Sanjeev kumarAmin, Ruhul and Vollala, Satyanarayana
10-Jan-2018Design and analysis of human signature authentication and IRIS verification systemBhattacharyya, DebnathBandyopadhyay, Samir Kumar