COMPUTER SCIENCE & ENGINEERING BIBLIOGRAPHY

Home

December 2012, Volume 1, Number 6

The New Approach to provide Trusted Platform in MANET (pdf)
Renu Dalal1, Manju Khari1 and Yudhvir Singh2, 1AIACTR, India and 2U.I.E.T M.D University, India

Implementation of Secure Authentication Mechanism for LBS using best Encryption Technique on the Bases of performance Analysis of cryptographic Algorithms (pdf)
Gurjeet Kaur and Monika Sachdeva,S.B.S State Technical Campus,India

October 2012, Volume 1, Number 5

Credit Card Fraud Detection Based on Ontology Graph(pdf)
Ali Ahmadian Ramaki, Reza Asgari and Reza Ebrahimi Atani,GuilanUniversity, Iran

Study and Performance Evaluation of Security-Throughput Tradeoff with Link Adaptive Encryption Scheme (pdf)
Poonam Jindal and Brahmjit Singh,NIT Kurukshetra, India

Key Generation and Certification using Multilayer Perceptron in Wireless Communication (KGCMLP)(pdf)
Arindam Sarkar and J. K. Mandal,University of Kalyani, India

August 2012, Volume 1, Number 3/4

URL Analysis and Cross Site Scripting with Secured Authentication Protocol System in Financial Services(pdf)
R.Sujatha and G.Arumugam, Madurai Kamaraj University,India.

Information Retrieval from Internet Applications for Digital Forensic(pdf)
Ipsita Mohanty and R. Leela Velusamy, National Institute of Technology,India.

Effective Implementation and Avalanche Effect of AES(pdf)
Amish Kumar and Namita Tiwari, MANIT, India.

Power and Trust based Secured Routing Approach in MANET(pdf)
Arnab Banerjee, Aniruddha Bhattacharyya and Dipayan Bose, Institute of Engineering & Management, Saltlake, India.

Rushing Attack Defending Context Aware Trusted AODV in Ad-Hoc Network(pdf)
Swarnali Hazra and S.K.Setua, University of Calcutta, India

Behavioral Identification of Trusted Third Party in Secure Multiparty Computing Protocol(pdf)
Zulfa Shaikh1 and Poonam Garg21Acropolis Institute of Technology & Research, India and 2Institute of Management Technology, Ghaziabad, India.

Hybrid Message-Embedded Cipher using Logistic Map(pdf)
Mina Mishra1 and V.H. Mankar21Nagpur University, India and 2Government Polytechnic, Nagpur, India.

Generating Audio Signal Authentication through Secret Embedded Self Harmonic Component (GASASH)(pdf)
Uttam Kr. Mondal1 and J.K.Mandal21College of Engg. & Management, Kolaghat , India and 2University of Kalyani, India.

April 2012, Volume 1, Number 2

Hash Based Least Significant Bit Technique for Video Steganography(HLSB)(pdf)
Kousik Dasgupta1, J.K. Mandal2 and Paramartha Dutta31Kalyani Govt. Engineering College, India, 2Kalyani University, India and 3Visva-Bharati University, India

February 2012, Volume 1, Number 1

Design and Development of a Ticket-Based Scheduling and Load Sharing Algorithm for Optimal Resource Usage in Mobile Computing Environments(pdf)
Natarajan Meghanathan1 and Sanjeev Baskiyar21Jackson State University, USA and 2Auburn University, USA

Trust-Based Approach in Wireless Sensor Networks Using an Agent to Each Cluster(pdf)
Yenumula B. Reddy, Grambling State University, USA

 

 

 

Copyright 2010 AIRCC. All rights reserved.

Maintained by NnN