Showing
1 - 12
results of
12
for search '
"Computers & security"
'
Skip to content
University Library
Library Catalogue Plus
Toggle navigation
New Search
Subject Guides (including databases)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
English
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Reset Filters
Journal Title:
International Journal Of Computer Applications
Subjects:
Cryptography
AND
Encryption
Reset Filters
Show filters (3)
Journal Title:
International Journal Of Computer Applications
Subjects:
Cryptography
AND
Encryption
Search Results - "Computers & security"
Showing
1 - 12
results of
12
for search '
"Computers & security"
'
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Secure Communication using RSA Algorithm for Network Environment
by
Jain, Amrita
,
Kapoor, Vivek
Published in
International journal of computer applications
Get full text
Article
Save to List
Saved in:
2
Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role based Access Control Model
by
JayantD, Bokefode
,
Swapnaja A., Ubale
,
Subhash V., Pingale
,
Kailash J., Karande
,
Sulabha S., Apate
Published in
International journal of computer applications
Get full text
Article
Save to List
Saved in:
3
Secured Wireless Data Communication
by
Hire, Dnyanda Namdeo
Published in
International journal of computer applications
Get full text
Article
Save to List
Saved in:
4
Policy for Secure Communication using Hybrid Encryption Algorithm
by
Jain, Amrita
,
Kapoor, Vivek
Published in
International journal of computer applications
Get full text
Article
Save to List
Saved in:
5
A New Simple Non-Expansion Algorithm for (2,2) - Visual Secret Sharing Scheme
by
Al-tamimi, Abdul-gabbar Tarish
,
Gaafar, Abdullah
Published in
International journal of computer applications
Get full text
Article
Save to List
Saved in:
6
A Framework for Secure Mobile Database Transactions using Cryptographic Co-processor
by
Sathiya, D
,
Rabara, S Albert
,
Martin, J Ronald
Published in
International journal of computer applications
Get full text
Article
Save to List
Saved in:
7
A Novel Approach of Designing Cryptographic Algorithm with High Confidentiality
by
Jain, Shubhi
,
Shibu, Sini
Published in
International journal of computer applications
Get full text
Article
Save to List
Saved in:
8
An Enhanced Symmetric Key Cryptography Algorithm to Improve Data
Security
by
Pandey, Krishna Kumar
,
Rangari, Vikas
,
Sinha, Sitesh Kumar
Published in
International journal of computer applications
Get full text
Article
Save to List
Saved in:
9
Text Encryption with Huffman Compression
by
Sangwan, Nigam
Published in
International journal of computer applications
Get full text
Article
Save to List
Saved in:
10
An Efficient SKM Framework for Data Authentication and its Application to the Adhoc Networks
by
Mary, Suma Christal
,
Rajasekaran, Pallikonda
,
Jeeva, Chrisbin
Published in
International journal of computer applications
Get full text
Article
Save to List
Saved in:
11
Symmetric Key Cryptography using Dynamic Key and Linear Congruential Generator (LCG)
by
Mahmood, Zeenat
,
Rana, J L
,
Khare, Ashish
Published in
International journal of computer applications
Get full text
Article
Save to List
Saved in:
12
Parallel Key Encryption for CBC And Interleaved CBC
by
Ashokkumar, S
,
Karuppasamy, K
,
Srinivasan, Balaji
,
Balasubramanian, V
Published in
International journal of computer applications
Get full text
Article
Save to List
Saved in:
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Back
Narrow Search
Limit To
Full Text
12
Format
Articles
12
Journal Title
International Journal Of Computer Applications
Subjects
Cryptography
Encryption
Algorithms
9
Computer Information Security
5
Messages
3
Symmetry
2
Mathematical Models
2
Keys
2
Internet
2
Integrity
2
Electronics
2
Digital Signatures
2
Blocking
2
Authentication
2
Access Control
1
Chaining
1
Cloud Computing
1
Compressing
1
Computer Programs
1
Damage
1
Year of Publication
From:
To:
Source
Freely Accessible Science Journals - Check A-Z Of Ejournals
12
Ezb Electronic Journals Library
12
© 2017 Loughborough University. All rights reserved.
Loading...