COMPUTER SCIENCE & ENGINEERING BIBLIOGRAPHY

Home

October 2013, Volume 2, Number 5

Cloud Computing Technology: Security and Trust Challenges [Pdf]
Sajjad Hashemi, Islamic Azad University, Iran

Security System with Face Recognition, Sms Alert and Embedded Network Video Monitoring Terminal [Pdf]
J. Shankar Kartik, K. Ram Kumar and V.S. Srimadhavan, SRM Easwari Engineering College, India

A Novel Multifactor Authentication System Ensuring Usability and Security [Pdf]
Gloriya Mathew and Shiney Thomas, Amal Jyothi College of Engineerng, India

Malicious Pdf Document Detection Based on Feature Extraction and Entropy [Pdf]
Himanshu Pareek, Center for Development of Advanced Computing, India

August 2013, Volume 2, Number 4

Data Storage Security Challenges in Cloud Computing [Pdf]
Sajjad Hashemi, Islamic Azad University, Iran
YourPrivacyProtector: A Recommender System for Privacy Settings in Social Networks[Pdf]
Kambiz Ghazinour1,2, Stan Matwin1,2,4 and Marina Sokolova1,2,3, 1School of Electrical Engineering and Computer Science University of Ottawa, 2CHEO Research Institute, Canada, 3University of Ottawa, Canada and 4Dalhousie University, Canada
Performance Evaluation of Message Security Using Fractal Sieve with MMD[Pdf]
Ch. Rupa, Vasireddy Venkatadri Institute of Technology, India
June 2013, Volume 2, Number 3
A Smart Wizard System Suitable for Use With Internet Mobile Devices to Adjust Personal Information Privacy Settings (pdf)
Nahier Aldhafferi, Charles Watson and A.S.M Sajeev, University of New England, Australia
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET (pdf)
Bhuvaneshwari .k and A. Francis Saviour Devaraj, Oxford College of Engineering, India
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET (pdf)
Vandana C.P and A. Francis Saviour Devaraj, Oxford College of Engineering, India
April 2013, Volume 2, Number 2

Personal Information Privacy Settings of Online Social Networks and Their Suitability for Mobile Internet Devices (pdf)
Nahier Aldhafferi, Charles Watson and A.S.M Sajeev, University of New England, Australia

Managing the Intertwining Among Users, Roles, Permissions, and User Relationships in an Information Flow Control Model (pdf)
Shih-Chien Chou, National Dong Hwa University, Hualien, Taiwan

An Evaluation of Energy Efficient Source Authentication Methods for False Data Filtering in WSN (pdf)
Syama M and Deepti C, The Oxford College of Engineering, India

A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Networks Using Trigger Identification Service (pdf)
Ramya Shivanagu and Deepti C, The Oxford College of Engineering, India

February 2013, Volume 2, Number 1

Design and Development of an Ultrasonic Motion Detector (pdf)
Adamu Murtala Zungeru, University of Nottingham, Malaysia

Automated Control for Risk Assessment on Unix Operating System - I (pdf)
Prashant Kumar Patra1 & Padma Lochan Pradhan2, 1College of Engineering & Technology, BPUT,India and 2Sikha 'O' Anusandhan University, India

An electronic digital combination lock: a Precise and reliable security system (pdf)
Adamu Murtala Zungeru, University of Nottingham, Malaysia

An Approach for Broader Range of Security in Cloud Computing (pdf)
R.Bala chandar, M.S.Kavitha and K.Seenivasan, Sri Shakthi Institute of Engineering and Technology, India

 

 

 

Copyright 2010 AIRCC. All rights reserved.

Maintained by NnN