The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SNDS"( http://dblp.L3S.de/Venues/SNDS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/snds

Publication years (Num. hits)
2012 (49) 2014 (50)
Publication types (Num. hits)
inproceedings(97) proceedings(2)
Venues (Conferences, Journals, ...)
SNDS(99)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 99 publication records. Showing 99 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Nishanth Augustine, Sudhish N. George, P. P. Deepthi Compressive Sensing Based Audio Scrambling Using Arnold Transform. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jithin R, Priya Chandran Virtual Machine Isolation - A Survey on the Security of Virtual Machines. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hiran V. Nath, Babu M. Mehtre Static Malware Analysis Using Machine Learning Methods. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1S. Anithakumari, K. Chandra Sekaran Autonomic SLA Management in Cloud Computing Services. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rajat Saxena, Somnath Dey Collaborative Approach for Data Integrity Verification in Cloud Computing. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anuradha Jadiya, Deepak Chatrabhuj Karia MM-SOAR: Modified SOAR Protocol Using Multiple Metrics for Wireless Mesh Network. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1K. P. Krishna Kumar, G. Geethakumari Analysis of Semantic Attacks in Online Social Networks. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Musheer Ahmad 0002, Parvez Mahmood Khan, Mohd. Zeeshan Ansari A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kanakkath Praveen, K. Rajeev, M. Sethumadhavan 0001 On the Extensions of (k, n)*-Visual Cryptographic Schemes. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Venkatasamy Sureshkumar, Anitha Ramalingam Analysis of Electronic Voting Protocol Using Strand Space Model. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dheerendra Mishra, Sourav Mukhopadhyay Cryptanalysis of Yang et al.'s Digital Rights Management Authentication Scheme Based on Smart Card. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vijay Anand Pandian, T. Gireesh Kumar A Novel Cloud Based NIDPS for Smartphones. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1C. R. Yamuna Devi, Deepak Sunder, S. H. Manjula, K. R. Venugopal 0001, Lalit M. Patnaik Chain Routing for Convergecast Small Scale Wireless Sensor Networks. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Saed Alrabaee, Khaled Khateeb, Fawaz Ali Khasawneh Preserving Database Privacy in Cloud Computing. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1M. Sindhu, M. Sethumadhavan 0001 On the k-error Joint Linear Complexity and Error Multisequence over F q (char F q = p, prime). Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1R. Deepa 0001, S. Swamynathan 0001 A Trust Model for Directory-Based Service Discovery in Mobile Ad Hoc Networks. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anant V. Nimkar, Soumya K. Ghosh 0001 A Theoretical Study on Access Control Model in Federated Systems. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1R. Anitha 0001, Saswati Mukherjee Metadata Attribute Based Cipher-Key Generation System in Cloud. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Appala Naidu Tentu, Prabal Paul, V. Ch. Venkaiah Computationally Perfect Secret Sharing Scheme Based on Error-Correcting Codes. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Muhammad Asif Khan 0002, Varun Jeoti A Novel Design of Chaos Based S-Box Using Difference Distribution Table (CD S-Box). Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Balu Sridevi, G. V. Shirley Julia, S. Rajaram 0001 Seamless Handoff of Ping-Pong Calls in Mobile Wimax Networks. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Payingat Jilna, P. P. Deepthi Implementation of an Elliptic Curve Based Message Authentication Code for Constrained Environments. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Deepak Chatrabhuj Karia, Shravanee Shinde Clustering Based Routing Strategies for Energy Management in Ad-Hoc Networks. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1R. Reno Robert Differential Execution Analysis for Obfuscation Reduction. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dinesh Nepolean, I. Karthik, Mu. Preethi, Rahul Goyal, M. Kathirvel Vanethi Privacy Preserving Ranked Keyword Search over Encrypted Cloud Data. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mahmoud Khasawneh, Izadeen Kajman, Rashed Alkhudaidy, Anwar Althubyani A Survey on Wi-Fi Protocols: WPA and WPA2. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dheerendra Mishra, Sourav Mukhopadhyay Cryptanalysis of Two Authentication Scheme for DRM System. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gregorio Martínez Pérez, Sabu M. Thampi, Ryan K. L. Ko, Lei Shu 0001 (eds.) Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Munaga V. N. K. Prasad, Ilaiah Kavati, B. Adinarayana Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Gabor Features. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sourav Sinha, Mamata Jenamani A Security Framework for Multi-authority Based e-Sealed Bid Auction System. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sangeetha Dhamodaran, Vaidehi Vijayakumar, Valliammai Thirunavukkarasu, Aiswarya Ramesh Enhanced Security of PHR System in Cloud Using Prioritized Level Based Encryption. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lovejit Singh, Sarbjeet Singh A Genetic Algorithm for Scheduling Workflow Applications in Unreliable Cloud Environment. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Germain Jolly, Sylvain Vernois, Jean-Luc Lambert Improving Test Conformance of Smart Cards versus EMV-Specification by Using on the Fly Temporal Property Verification. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nilesh Chakraborty, Samrat Mondal SLASS: Secure Login against Shoulder Surfing. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bhavna Saini, Gaurav Somani 0001 Index Page Based EDoS Attacks in Infrastructure Cloud. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1G. Jyothish Lal, V. K. Veena A Novel Audio Watermark Embedding and Extraction Method Based on Compressive Sensing, Sinusoidal Coding, Reduced SVD, Over Complete Dictionary and L1 Optimization. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1C. R. Yamuna Devi, B. Shivaraj, S. H. Manjula, K. R. Venugopal 0001, Lalit M. Patnaik EESOR: Energy Efficient Selective Opportunistic Routing in Wireless Sensor Networks. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mridul Sankar Barik, Chandan Mazumdar A Graph Data Model for Attack Graph Generation and Analysis. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Saumya Omanakuttan, Madhumita Chatterjee Experimental Analysis on Access Control Using Trust Parameter for Social Network. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Marcus Hardt, Arsen Hayrapetyan, A. Paul Millar, Ahmed Shiraz Memon Combining the X.509 and the SAML Federated Identity Management Systems. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Balasubramanian Chelliah, S. Geetha 0001 Enhancing E-Payment Security through Biometric Based Personal Authentication Using Steganography Scheme - B-PASS. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Monika Darji, Bhushan Trivedi Emergency Aware, Non-invasive, Personalized Access Control Framework for IMDs. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1P. Badharudheen, Anu Mary Chacko, S. D. Madhu Kumar Making an Application Provenance-Aware through UML - A General Scheme. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dibyendu Roy 0001, Pratish Datta, Sourav Mukhopadhyay A New Variant of Algebraic Attack. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Adrian Pauna, Victor Valeriu Patriciu CASSHH - Case Adaptive SSH Honeypot. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jayalakshmi G. Naragund, R. M. Banakar Warfare Message Communication in Tactical WMN Using HWMP. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ratinder Kaur, Maninder Singh Automatic Evaluation and Signature Generation Technique for Thwarting Zero-Day Attacks. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shree Garg, Anil Kumar Sarje, Sateesh Kumar Peddoju Improved Detection of P2P Botnets through Network Behavior Analysis. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1T. R. Venugopal Anandharajan, Marcharla Anjaneyulu Bhagyaveni Trust Based VM Consolidation in Cloud Data Centers. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1S. Fouzul Hidhaya, Angelina Geetha Intrusion Protection against SQL Injection and Cross Site Scripting Attacks Using a Reverse Proxy. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Subhashis Banerjee, Koushik Majumder A Survey of Blackhole Attacks and Countermeasures in Wireless Mobile Ad-hoc Networks. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Anjali Avinash Chandavale, Ashok M. Sapkal A New Approach towards Segmentation for Breaking CAPTCHA. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tiana Razafindralambo, Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Praneet Saurabh, Bhupendra Verma, Sanjeev Kumar Sharma Biologically Inspired Computer Security System: The Way Ahead. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Srikumar Manghat A New Deterministic Algorithm for Testing Primality Based on a New Property of Prime Numbers. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dheerendra Mishra, Sourav Mukhopadhyay Towards a Secure, Transparent and Privacy-Preserving DRM System. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Balan Chelliah, Divya S. Vidyadharan, P. Shabana, K. L. Thomas Carving of Bitmap Files from Digital Evidences by Contiguous File Filtering. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nelcileno Araújo, Ruy de Oliveira, Ed Wilson Tavares Ferreira, Valtemir Nascimento, Ailton Akira Shinoda, Bharat K. Bhargava Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lucas Rodrigo Raso Mattos, Vijayaraghavan Varadharajan, Rajarathnam Nallusamy Data Protection and Privacy Preservation Using Searchable Encryption on Outsourced Databases. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Adapa Tataram, Alwyn Roshan Pais Location Estimation of Mobile in GSM and CDMA Networks. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nitin Goel, Shruti Sangwan, Ajay Jangra Efficient Weighted innovative Routing Protocol (EWiRP) to Balance Load in Mobile Ad Hoc Networks (MANETs): Simulation and Feasibility Analysis. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Aman Jantan, Mohammad Rasmi, Mohd Izham Ibrahim, Azri H. A. Rahman A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network Forensics. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1P. R. Mahalingam Three-Way Handshake-Based OTP Using Random Host-Side Keys for Effective Key Transfer in Symmetric Cryptosystems. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vanga Odelu, Ashok Kumar Das, Adrijit Goswami A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Adarsh Kumar, Alok Aggarwal Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Madhan Kumar Srinivasan, K. Sarukesi, Ashima Keshava, P. Revathy eCloudIDS Tier-1 uX-Engine Subsystem Design and Implementation Using Self-Organizing Map (SOM) for Secure Cloud Computing Environment. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Philipp Digeser, Marco Tubolino, Martin Klemm, Axel Sikora Management of Routed Wireless M-Bus Networks for Sparsely Populated Large-Scale Smart-Metering Installations. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Prashant Kumar Mishra, Kunwar Singh, Sudhanshu Baruntar ID-Based Threshold Signcryption and Group Unsigncryption. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Stefan-Vladimir Ghita, Victor Valeriu Patriciu, Ion Bica Experimental DRM Model Using Mobile Code and White-Box Encryption. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Debajit Sensarma, Koushik Majumder A Comparative Analysis of the Ant Based Systems for QoS Routing in MANET. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1P. V. Sruthi, Prabaharan Poornachandran, A. S. Remya Ajai Performance Analysis and Improvement Using LFSR in the Pipelined Key Scheduling Section of DES. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jerzy Konorski, Piotr Pacyna, Grzegorz Kolaczek, Zbigniew Kotulski, Krzysztof Cabaj, Pawel Szalachowski A Virtualization-Level Future Internet Defense-in-Depth Architecture. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Amine Abidi, Ghazi Ben Ayed, Farouk Kamoun Towards Constructing a Trustworthy Internet: Privacy-Aware Transfer of Digital Identity Document in Content Centric Internetworking. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jinu Elizabeth John, A. S. Remya Ajai, Prabaharan Poornachandran Effective Implementation of DES Algorithm for Voice Scrambling. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1B. R. Purushothama, Kusuma Shirisha, Bharat Amberker Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1M. T. Chitra, R. Priya, Elizabeth Sherly Time Based Constrained Object Identification in a Dynamic Social Network. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Enrico Cambiaso, Gianluca Papaleo, Maurizio Aiello Taxonomy of Slow DoS Attacks to Web Applications. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Abraham Jobin, Paul Varghese Imperceptible Image Indexing Using Digital Watermarking. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Muthulakshmi Angamuthu, Anitha Ramalingam, S. Rohini, Krishnan Princy Identity Based Privacy Preserving Dynamic Broadcast Encryption for Multi-privileged Groups. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1B. R. Purushothama, Bharat Amberker Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Monika Darji, Bhushan Trivedi Secure Leader Election Algorithm Optimized for Power Saving Using Mobile Agents for Intrusion Detection in MANET. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Somanath Tripathy, Debasish Sahoo WAKE: Authentication and Key Establishment for Wireless Mesh Network. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1S. Dija, T. R. Deepthi, C. Balan, K. L. Thomas Towards Retrieving Live Forensic Artifacts in Offline Forensics. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Keerthi Balasundaram, Madhan Kumar Srinivasan, K. Sarukesi iReSign - Implementation of Next-Generation Two-Tier Identity Classifier-Based Traffic Sign Recognition System Architecture Using Hybrid Region-Based Shape Representation Techniques. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Deepa Krishnan, Madhumita Chatterjee An Adaptive Distributed Intrusion Detection System for Cloud Computing Framework. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Subhashis Banerjee, Koushik Majumder A Comparative Study on Wormhole Attack Prevention Schemes in Mobile Ad-Hoc Network. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ananya Chowdhury, Utpal Kumar Ray Implementation of MD6. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Manjunath Mattam Protocol for Secure Submissions into Learning Management Systems. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Madhan Kumar Srinivasan, K. Sarukesi, Ashima Keshava, P. Revathy eCloudIDS - Design Roadmap for the Architecture of Next-Generation Hybrid Two-Tier Expert Engine-Based IDS for Cloud Computing Environment. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, José M. Alcaraz Calero, Tony Thomas (eds.) Recent Trends in Computer Networks and Distributed Systems Security - International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nilanjan Dey, Anamitra Bardhan Roy, Achintya Das, Sheli Sinha Chaudhuri Stationary Wavelet Transformation Based Self-recovery of Blind-Watermark from Electrocardiogram Signal in Wireless Telecardiology. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ram Shringar Raw, Daya Krishan Lobiyal, Sanjoy Das An Analytical Approach to Position-Based Routing Protocol for Vehicular Ad Hoc Networks. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Anjali Avinash Chandavale, Ashok M. Sapkal Security Analysis of CAPTCHA. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1B. G. Nagaraja, Haradagere Siddaramaiah Jayanna Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCC. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1S. Santhanalakshmi, T. S. B. Sudarshan, Gopal K. Patra Neural Synchronization by Mutual Learning Using Genetic Approach for Secure Key Generation. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Aravind Ashok, Prabaharan Poornachandran, Krishnashree Achuthan Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1V. Vasanthi, M. Hemalatha Simulation and Evaluation of Different Mobility Models in Ad-Hoc Sensor Network over DSR Protocol Using Bonnmotion Tool. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Harshvardhan Tiwari, Ankit Luthra, Himanshu Goel, Sambhav Sharma, Krishna Asawa Crypto-Precision: Testing Tool for Hash Function. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #99 of 99 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license