Showing results 1 to 20 of 56
next >
Upload Date | Title | Researcher | Guide(s) |
9-Mar-2020 | A Cascaded Toolkit for Secure Data Transmission | Das Ramkrishna | Dutta Saurabh |
14-Mar-2018 | A credential based authentication approach for securing data in cloud | Arya, Pradeep Kumar | Selvamani, K |
23-Oct-2023 | An enhanced key management schemes for secure group communication | Parthasarathi P | Shankar S |
14-Mar-2018 | An improved hybrid authenticated trust system for clustered wireless sensor networks in military applications | R, Sivakumar | S, Duraisamy |
10-Sep-2021 | An investigation and design of post quantum privacy preserving signatures | Thanalakshmi, P | Anitha, R |
26-Apr-2021 | Authenticated encryption for memory constrained devices | Agrawal, Megha | Chang, Donghoon and Somitra, Sanadhya |
19-Oct-2016 | Authentication schemes using smart card for secure communication | Marimuthu, K | Sravannan, R |
30-Dec-2016 | Authentication using IRIS pseudo textures based fuzzy vault | Reddy, E Sreenivasa | Babu, I Ramesh |
21-Dec-2023 | Bioanalytical approach to standardize plant having anti inflammatory activity | Rane, Nilan Jaisingh | Vaidya, Vikas V |
14-Nov-2017 | Biometric authentication and pin distribution based architecture for secure mobile commerce applications | R, Arun Prakash | Mehata, K M |
1-Aug-2019 | Centralized and decentralized trust based security schemes for manet | Prathapchandran, K | Sivagurunathan, S |
16-Nov-2017 | Certain computational intelligent techniques for classification authentication and indexing of lung computed tomography images | I, Jasmine Selvakumari Jeya | Deepa, S N |
19-Oct-2020 | Certain investigations on touch dynamics for user authentication on touch screen mobile devices | Senthil Prabha R | Vidhyapriya R |
23-Mar-2017 | Certain investigations on transform based techniques in palmprint and finger knuckle print biometrics for human authentication | Mahesh Kumar, N. B. | Premalatha, K. |
25-Jan-2016 | Certificate less multifactor authentication schemes for secure grid environment | Jaspher Willsie Kathrine, G | Kirubakaran, E and Blessing, R Elijah |
21-Oct-2016 | Content based watermarking for image authentication | Latha, B | Anbumani, K |
12-Sep-2018 | Cybercrime case study of security incidents on internet | Pathak, Pradeep Balkrishna | Kalyankar, N V |
14-Sep-2022 | Data security and authentication using steganography | B. Ravi Kumar | Murti P.R.K |
23-Jan-2024 | Design and Analysis of Blockchain Based Data Security Protocols with Authentication Mechanism | Dwivedi, Sanjeev kumar | Amin, Ruhul and Vollala, Satyanarayana |
10-Jan-2018 | Design and analysis of human signature authentication and IRIS verification system | Bhattacharyya, Debnath | Bandyopadhyay, Samir Kumar |