SR |
M-CODE |
CITATION |
|
1 |
|
Çakir, H., & Kiliç, M. S. (2016). The keyword search method and its importance in computer forensics Adli bilisimde anahtar kelime aramasi metodu ve önemi. Journal of Human Sciences, 13(1), 2368-2384. |
|
2 |
|
Racheal, B. O., & Adeosun, O. O. (2016). Employing The Use of Steganography for The Secured Transmission of Information In Mobile Devices. |
|
3 |
|
Pukkasenung, P., & Chokngamwong, R. (2016). Review and Comparison of Mobile Payment Protocol. In Advances in Parallel and Distributed Computing and Ubiquitous Services (pp. 11-20). Springer Singapore. |
|
4 |
|
Bhosale, D. V., Mitkal, P. K., Pawar, R. N., & Paranjape, R. S. (2016). Review on Computer Forensic. Training, 2(01). |
|
5 |
|
Rajkumar, A., & Malliga, P. (2016). A fuzzy analytical hierarchy process approach for prioritising the buyers in selling by-product of a sugar plant. International Journal of Logistics Systems and Management, 24(1), 94-112. |
|
6 |
|
Kumar, D. N. S., & Prabhakar, K. New Image Security Method based on Hill-Cipher. |
|
7 |
|
Chakdar, D., Gope, G., Talukdar, A., Avasthi, D. K., & Nath, S. S. (2016). Optical absorption and luminescence study of ZnS quantum dots. une, 13, 15. |
|
8 |
|
Vierto, V. M. (2016). Älykorttipalvelut suomalaisten kuluttajien näkökulmasta. |
|
9 |
|
Gerdes Jr, J. H., Huang, C. T., & Sharaf, M. A. Incorporating biometrics into veiled certificates: preventing unauthorized use of anonymous certificates. Electronic Commerce Research, 1-28. |
|
10 |
|
Sonekar, S. V., & Kshirsagar, M. M. (2016). Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks. In Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015 (pp. 317-328). Springer India. |
|
11 |
|
Vegh, L., & Miclea, L. Improving the Security of a Cyber-Physical System using Cryptography, Steganography and Digital Signatures. |
|
12 |
|
Supiyanto, S. (2015, December). Implementasi hill cipher pada citra menggunakan koefisien binomial sebagai matriks kunci. In Seminar Nasional Informatika (SEMNASIF) (Vol. 1, No. 1). |
|
13 |
|
Kongnso, F. J. (2015). Best Practices to Minimize Data Security Breaches for Increased Business Performance. |
|
14 |
|
Kariuki, P. (2015). Generic process model for android smartphones live memory forensics (doctoral dissertation). |
|
15 |
|
Chhotaray, S. K., Chhotaray, A., & Rath, G. S. A new method of generating public key matrix and using it for image encryption. |
|
16 |
|
Kumar, L. R., Prakash, P. R., Gopal, G. V., Dharani, D. L., & Rao, B. S. Watermark based Substitution technique Hill Cipher applied on Images. |
|
17 |
|
kamenchenko, s. recursive involutory matrix generation algorithm, which is based only with elements±1 and±2. |
|
18 |
|
Casmir, R. O. (2015). DETERMINING APPROPRIATE SECURITY PROTECTION FOR ENTERPRISE INFORMATION RESOURCES. Business Education Journal, 1(1). |
|
19 |
|
Joshi, A., & Kumari, M. Encryption of RGB image using Arnold transform and involutory matrices. |
|
20 |
|
Khan, M. H. M. (2015). Representation of Dorsal Hand Vein Pattern Using Local Binary Patterns (LBP). In Codes, Cryptology, and Information Security (pp. 331-341). Springer International Publishing. |
|
21 |
|
Ahmad, F. (2015). Copyright Protection for Surveillance System Multimedia Stream with Cellular Automata Watermarking. Control Theory and Informatics, 5(1), 10-15. |
|
22 |
|
Im, H., & Kim, T. S. (2015). An Empirical Study on Citizen’s Adoption Behavior of Internet Personal Identification Number (i-PIN) System. |
|
23 |
|
Chizari, H. Security Issues in ATM Smart Card Technology. |
|
24 |
|
Taherdoost, h., sahibuddin, s., & jalaliyoon, N. How Security Issues Can Influence on Usage of Electronic Services. |
|
25 |
|
Taherdoost, h., sahibuddin, s., & jalaliyoon, N. E-Service Security; Acceptance Perspective. |
|
26 |
|
Im, H., Park, S. T., & Ko, M. H. (2015). An Empirical Study on a Tradeoff between Security and Convenience: The Case of i-PIN System. Indian Journal of Science and Technology, 8(23). |
|
27 |
|
Arjunwadkar, M. V. (2015). The knowledge based intrusion detection and prevention model for biometric system. |
|
28 |
|
Gobi, M., & Kannan, D. (2015). A Secured Public Key Cryptosystem for Biometric Encryption. International Journal of Computer Science and Network Security (IJCSNS), 15(1), 49. |
|
29 |
|
Patil, S., Bhosale, S., & Patil, S. (2015). A Two Fold Approach to Store and Share Secrete Data for Groups in Cloud. IJETT, 2(2). |
|
30 |
|
Aghajanzadeh, N., & Keshavarz-Haddad, A. (2015). A Concise Model to Evaluate Security of SCADA Systems based on Security Standards. International Journal of Computer Applications, 111(14). |
|
31 |
|
Debnath, D., Deb, S., & Kar, N. (2015, January). An Advanced Image Encryption Standard Providing Dual Security: Encryption Using Hill Cipher & RGB Image Steganography. In Computational Intelligence and Networks (CINE), 2015 International Conference on (pp. 178-183). IEEE. |
|
32 |
|
Adil, A. R. (2015). Text Steganography to Border Image Using Novel Method. Applied Mathematical Sciences, 9(62), 3087-3096. |
|
33 |
|
Panduranga, H. T. (2015). Development of image encryption and partial image encryption algorithms. |
|
34 |
|
Selvi, A. K., & Sathik, M. M. (2015). Efficiency Analysis and Security Evaluation of Block based Image Encryption Schemes. Digital Image Processing, 7(1), 29-32. |
|
35 |
|
Sharma, A. K., & Sharma, H. (2015).New approach to des with enhanced key management and encryption/decryption system (des ultimate). International Journal of Advances in Engineering & Technology, 8(3), 368. |
|
36 |
|
Kalaiselvi, R., & Kavitha, V. (2015). An efficient mechanism for protecting grid from attack using GSOC. International Journal of Enterprise Network Management, 6(4), 312-323. |
|
37 |
|
Naveenkumar, S. K., & Panduranga, H. T. (2015, March). Chaos and Hill Cipher Based Image Encryption for Mammography Images. In Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on (pp. 1-5). IEEE. |
|
38 |
|
Wójtowicz, W. Wykorzystanie technik biometrycznych do tworzenia cyfrowych znaków wodnych. |
|
39 |
|
Rocabado, S. (2014). Caso de estudio de comunicaciones seguras sobre redes móviles ad hoc (Doctoral dissertation, Facultad de Informática). |
|
40 |
|
Tripathy, A., & Kumar, D. Image Steganography By Using Integer Wavelet Transform And Genetic Algorithm To Perform Text Based Hiding Behind Gray Scaled or Colored Image. |
|
41 |
|
Selvi, A. K., & Sathik, M. M. (2014). Performance Evaluation of Block based Image Encryption Algorithms. Digital Image Processing, 6(8), 342-345. |
|
42 |
|
Premnath, A. P., Jo, J. Y., & Kim, Y. (2014, April). Application of NTRU Cryptographic Algorithm for SCADA Security. In Information Technology: New Generations (ITNG), 2014 11th International Conference on (pp. 341-346). IEEE. |
|
43 |
|
Shahzad, A., Musa, S., Irfan, M., & Asadullah, S. (2014). Key Encryption Method for SCADA Security Enhancement. Journal of Applied Sciences, 14(20), 2498. |
|
44 |
|
Vegh, L., & Miclea, L. (2014, May). Securing communication in cyber-physical systems using steganography and cryptography. In Communications (COMM), 2014 10th International Conference on (pp. 1-4). IEEE. |
|
45 |
|
Gupta, R., Agarwal, R., & Goyal, S. A Review of Cyber Security Techniques for Critical Infrastructure Protection. |
|
46 |
|
Shahzad, A., Musa, S., Irfan, M., & Asadullah, S. (2014). Deployment of New Dynamic Cryptography Buffer for SCADA Security Enhancement. Journal of Applied Sciences, 14(20), 2487. |
|
47 |
|
Rajni, M., & Reena, M. (2014). Review of MANETS Using Distributed Public-key Cryptography. arXiv preprint arXiv:1405.0100. |
|
48 |
|
Taherdoost, h., sahibuddin, s., & jalaliyoon, n. (2014). Evaluation of Security Factors Effecting on Web-Based Service Adoption. Recent Advances In Telecommunications, Informatics And Educational Technologies, 117-123. |
|
49 |
|
Velakanti, G., & Katuri, A. (2014). Enhancement of Existing Tools and Techniques for Computer Forensic Investigation. International Journal of Computer Science and Network Security (IJCSNS), 14(12), 74. |
|
50 |
|
Bryant, M. S., & Bryant, R. (Eds.). (2014). Policing Digital Crime. Ashgate Publishing, Ltd.. |
|
51 |
|
Adnan, A., Cazan, A., Safa, M., Lung, A. W. M., & Muppala, S. The Application of Theory of Constraints in Manufacturing Outsourcing: A Case Study. |
|
52 |
|
Rajni, M., Reena, M., & Reena, M. Nav view search. |
|
53 |
|
Partha Sarathi, N. G., & Otto, C. O. (2014, March). Fare management system for transport corporation using face recognition based on principal component analysis. In Green Computing Communication and Electrical Engineering (ICGCCEE), 2014 International Conference on (pp. 1-5). IEEE. |
|
54 |
|
Ariffin, M., Afiza, N., & Mohd Sani, N. F. (2014, August). Plan recognition scheme using multi-factors authentication for smart card online system. In Biometrics and Security Technologies (ISBAST), 2014 International Symposium on (pp. 156-160). IEEE. |
|
55 |
|
Glenn, T., & Monteith, S. (2014). Privacy in the digital world: medical and health data outside of HIPAA protections. Current psychiatry reports, 16(11), 1-11. |
|
56 |
|
AN, R. (2014). An Adaptive Dual Image Encryption: A Review. |
|
57 |
|
Taherdoost, H., Sahibuddin, S., & Jalaliyoon, N. Appraisal of Individual Understanding of Social and Ethical Circumstances; Information Technology Utilization. |
|
58 |
|
Moradi, H., & Moghaddam, H. K. Assessing the Readiness of Civil Registration Bureau of South Khorasan Province to Exploit the Experiences of National Smart ID card Establishment throughout the World. |
|
59 |
|
Koley, S., Pal, K., Ghosh, G., & Bhattacharya, M. (2014). Secure Transmission and Recovery of Embedded Patient Information from Biomedical Images of Different Modalities through a Combination of Cryptography and Watermarking. International Journal of Image, Graphics and Signal Processing (IJIGSP), 6(4), 18. |
|
60 |
|
MIET, M. I. Extended Hill Cipher Decryption by Using Transposed Interweaved Shifting. |
|
61 |
|
SelvaKumar, T. N. D. A. L. (2014). Encryption using lester hill cipher algorithm. |
|
62 |
|
Esan, O. A., Zuva, T., Ngwira, S., & Masupa, L. Mitigating face biometric on electronic medical record. |
|
63 |
|
Abbas, N. A. (2014). Image watermark detection techniques using quadtrees. Applied Computing and Informatics. |
|
64 |
|
Amounas, F., & El Kinani, E. H. Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve. |
|
65 |
|
Sastry, V. U. K., & Samson, C. A Modern advanced hill cipher including a pair of involutory matrices as multiplicands and involving a set of functions. A= A, 1, 2-1. |
|
66 |
|
Vegh, L., & Miclea, L. (2014, May). A new approach towards increased security in cyber-physical systems. In Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on (pp. 175-178). IEEE. |
|
67 |
|
Vegh, L., & Miclea, L. (2014, May). Enhancing security in cyber-physical systems through cryptographic and steganographic techniques. In Automation, Quality and Testing, Robotics, 2014 IEEE International Conference on (pp. 1-6). IEEE. |
|
68 |
|
Vegh, L., & Miclea, L. (2014, October). A framework for verifying the integrity of the components of a secure cyber-physical system. In System Theory, Control and Computing (ICSTCC), 2014 18th International Conference (pp. 763-768). IEEE. |
|
69 |
|
Nashwan, S., & Alshammari, B. (2014). Mutual Chain Authentication Protocol for SPAN Transactions in Saudi Arabian Banking. International Journal of Computer and Communication Engineering, 3(5), 326. |
|
70 |
|
Wójtowicz, W., & Ogiela, M. R. (2014). Biometric watermarks based on face recognition methods for authentication of digital images. Security and Communication Networks. |
|
71 |
|
Chezian, R. M. Big Data Management through polymer Data to accentuate Progression based algorithm. |
|
72 |
|
Sang, J. M. (2014). Mobile Based HIV Patient Identification for Antiretroviral Drugs Dispensing (Doctoral dissertation, Strathmore University). |
|
73 |
|
Akinsowon, O., Alese, B., & Adewale, O. (2014). Infrared Capture of Palm-Vein Blood Vessel Patterns for Human Authentication. |
|
74 |
|
Patil, M., Sahu, V., & Jain, A. (2014, January). SMS text Compression and Encryption on Android OS. In Computer Communication and Informatics (ICCCI), 2014 International Conference on (pp. 1-6). IEEE. |
|
75 |
|
Sumathi, C. P., Santanam, T., & Umamaheswari, G. (2014). A Study of Various Steganographic Techniques Used for Information Hiding. arXiv preprint arXiv:1401.5561. |
|
76 |
|
Ogiela, M. R. (2014). New Directions in Cognitive Cryptography. Journal of Convergence Volume, 5(3). |
|
77 |
|
Jayanthi, V. E. (2014). Design and implementation of vlsi Architecture algorithms for digital Image watermarking. |
|
78 |
|
Jonas, M., Solangasenathirajan, S., & Hett, D. (2014). Patient Identification, A Review of the Use of Biometrics in the ICU. In Annual Update in Intensive Care and Emergency Medicine 2014 (pp. 679-688). Springer International Publishing. |
|
79 |
|
Staniec, K., & Kowal, M. (2013). A simple method for determining an optimal number of access points in distributed WLAN networks. Elektronika ir Elektrotechnika, 19(9), 101-104. |
|
80 |
|
Shahri, A. B., Ismail, Z., & Rahim, N. Z. A. (2013). Security Culture and Security Awareness as the Basic Factors for Security Effectiveness in Health Information Systems. Jurnal Teknologi, 64(2). |
|
81 |
|
Akinsowon, O. A., & Alese, B. K. (2013, December). Edge detection methods in palm-print identification. In Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for (pp. 422-426). IEEE. |
|
82 |
|
Nakhumwa, J. N. (2013). Adoption of E-commerce Payment Systems by Commercial Banks in Kenya (Doctoral dissertation, University of Nairobi). |
|
83 |
|
Patil, M., & Sahu, V. (2013). A Survey of Compression and Encryption Techniques for SMS. |
|
84 |
|
Nithya, M., & Varadarajan, V. (2013). An Security Architecture for Campus Virtual Organization Using Role Based Access Control. Life Science Journal, 10(7s). |
|
85 |
|
Manro, R., & Joshi, A. S. (2013).Utilization the power of cloud computing to offer e-governance services through saas model. International Journal of Information Technology & Computer Sciences Perspectives, 2(2), 565. |
|
86 |
|
WANG, D. (2013). Malicious Node Detection Mechanism for Wireless Ad Hoc Network. International Journal of Security (IJS), 7(1), 1. |
|
87 |
|
Sakthivel, A., & Nedunchezhian, R. (2013). Improved the execution speed of ecdsa over gf (2 n) algorithm for concurrent computation. Journal of Theoretical & Applied Information Technology,50(1). |
|
88 |
|
Rakesh, S. M., Sandeep, G. S. P., Manikantan, K., & Ramachandran, S. (2013, January). DFT-Based Feature Extraction and Intensity Mapped Contrast Enhancement for Enhanced Iris Recognition. In Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012) (pp. 481-494). Springer India. |
|
89 |
|
Muhammad, J. (2013). Exploring the automatic identi?cation and resolution of software vulnerabilities in grid-based environments (Doctoral dissertation, University of Glasgow). |
|
90 |
|
Kavadia, C. (2013). A Review on Spatial & Transform Domain Digital Watermarking Techniques. International Journal of Advanced Research in Computer Science, 4(3). |
|
91 |
|
Joseph, A., & Jayasingh, J. R. (2013). Digital Watermarking using Least Significant Bit Insertion Method. Digital Image Processing, 5(2), 76-85. |
|
92 |
|
Piñol, M., Sappa, A. D., & Toledo, R. (2013, January). Multi-Table Reinforcement Learning for Visual Object Recognition. In Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012) (pp. 469-479). Springer India. |
|
93 |
|
Shah, S., Khan, S. A., & Riaz, N. (2013). Analytical Study of Face Recognition Techniques. |
|
94 |
|
Shahri, A. B., Ismail, Z., & Rahim, N. Z. A. (2013). Constructing Conceptual Model for Security Culture in Health Information Systems Security Effectiveness. In Advances in Information Systems and Technologies (pp. 213-220). Springer Berlin Heidelberg. |
|
95 |
|
Al-Khouri, A. M. (2013). Triggering the Smart Card Readers Supply Chain. |
|
96 |
|
Alam, K. M. R., Mahmud, S., & Khan, M. N. A. (2013). An Exploitation of Blind Signature Schemes to Simulate Privacy-related Applications. International Journal of Computer Applications, 66(3). |
|
97 |
|
Emmanuel, W. S., & Singh, C. E. J. (2013).Digital color image encryption based on invertible matrix with secret sharing. ICTACT J. Image and Video Procss, 3(3), 572-576. |
|
98 |
|
Barkathunisha, S., & Meenakumari, R. (2013, April). Secure transmission of medical information using IRIS recognition and steganography. In Computation of Power, Energy, Information and Communication (ICCPEIC), 2013 International Conference on (pp. 89-92). IEEE.Pawar, A., Kumbhare, T., & Murkute, P. Enhancing Iris Scanning Using Visual Cryptography. |
|
99 |
|
Rahmes, M., Wilder, K., & Fox, K. (2013, May). A multi-resolution fractal additive scheme for blind watermarking of 3D point data. In SPIE Defense, Security, and Sensing (pp. 87570G-87570G). International Society for Optics and Photonics. |
|
100 |
|
Roja, M. M., & Sawarkar, S. (2013). ElGamel Encryption for Biometric Database Protection. International Journal of Computer Applications, 68(6). |
|
101 |
|
Bhansali, A., HiralBarot, K., Shah, S., & Chheda, V. (2013). Encrypting Watermarked Images: A Transparent Approach. International Journal of Future Computer and Communication, 2(6), 665. |
|
102 |
|
Samson, C., & Sastry, V. U. K. (2013). Encryption of a Gray level Image and a Color Image by Using a Key Bunch Matrix. nternational Journal of Advanced Computing, ISSN, 2051-0845. |
|
103 |
|
Soyjaudah, K. S., & KA, S. D. (2013). Overview of Linear Cryptanalysis on S-DES and Block Ciphers using Hill Cipher Method. International Journal of Computer Applications, 63(21). |
|
104 |
|
Taherdoost, H., Sahibuddin, S., & Jalaliyoon, N. (2013, December). Assessment of Electronic Service Applications Practice: Domains Perspective. In Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on (pp. 534-537). IEEE. |
|
105 |
|
Staniec, K., & Kowal, M. (2013). A simple method for determining an optimal number of access points in distributed WLAN networks. Elektronika ir Elektrotechnika, 19(9), 101-104. |
|
106 |
|
Kaur, G., & Malhotra, S. A Hybrid Approach for Data Hiding using Cryptography Schemes. |
|
107 |
|
Vijay Arputharaj, J., & Chezian, R. M. (2013). Data Mining through DNA Database to Enhance Gene Bases Algorithm. |
|
108 |
|
ManiRoja, M., & Sawarkar, S. (2013). Biometric Database Protection using Public Key Cryptography. International Journal of Computer Science and Network Security (IJCSNS), 13(5), 20. |
|
109 |
|
Neralla, S., Bhaskari, D. L., & Avadhani, P. S. (2013). Combating against anti-forensics aligned with e-mail forensics. International Journal of Computer Applications, 79(15). |
|
110 |
|
Munpilju. (2013). Utilization of forensic tools - Antigua for Android smartphones. Korea Electronics and Telecommunications Institute of Science, 8 (6), 855-861. |
|
111 |
|
Hashemnejad, R., & Purushothaman, K. Wireless ad hoc networks:malicious nodedetection. |
|
112 |
|
Chhotaray, S. K., Majhi, J., & Rath, G. S. (2013). Encryption by Hill cipher and by a novel method using Chinese remainder theorem in Galois field. International Journal of Signal and Imaging Systems Engineering, 6(1), 38-45. |
|
113 |
|
Ramachandran, S., & Lavanya, S. A Cluster based Cost Effective Group Key Management Protocol for Multicast Network. |
|
114 |
|
Taherdoost, H., Sahibuddin, S., Jalaliyoon, N., & Hosseinkhani, J. (2013, December). Classification of Web based Service User Types. In Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on (pp. 495-499). IEEE. |
|
115 |
|
Taherdoost, H., & Hosseinkhani, J. (2013, December). Information Mining on the Web: E-business Application. In Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on (pp. 500-503). IEEE. |
|
116 |
|
Taherdoost, H., Sahibuddin, S., Namayandeh, M., & Jalaliyoon, N. (2013, December). Computer and Information Security Ethics--Models. In Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on (pp. 145-149). IEEE. |
|
117 |
|
Muthusamy, S. K., Thiyagarajan, P., & Selvaraj, L. (2013). An enhanced and cost effective group key management scheme for multicast network. Journal of Computer Science, 9(4), 477. |
|
118 |
|
Lamba, S., & Sharma, M. (2013, December). An Efficient Elliptic Curve Digital Signature Algorithm (ECDSA). In Machine Intelligence and Research Advancement (ICMIRA), 2013 International Conference on (pp. 179-183). IEEE. |
|
119 |
|
Islam, N., & Shaikh, Z. A. (2013). Security Issues in Mobile Ad Hoc Network. In Wireless Networks and Security (pp. 49-80). Springer Berlin Heidelberg. |
|
120 |
|
Kumar, S., Purusothaman, N. M., & Lavanya, S. (2013). Design and performance analysis of scalable and efficient group key Management scheme [SEGKMS] for group communication in multicast networks. Life Science Journal, 10(2). |
|
121 |
|
Puliadi Premnath, A. (2013). Application of NTRU Cryptographic Algorithm for securing SCADA communication. |
|
122 |
|
El-Sayed, A. (2013). Clustering Based Group Key Management for MANET. In Advances in Security of Information and Communication Networks (pp. 11-26). Springer Berlin Heidelberg. |
|
123 |
|
WANG, D. (2013). Malicious Node Detection Mechanism for Wireless Ad Hoc Network. International Journal of Security (IJS), 7(1), 1. |
|
124 |
|
Nandeesh, G. S., Vijaya, P. A., & Sathyanarayana, M. V. (2013). An Image Encryption using Bit level permutation and dependent diffusion. International Journal of Computer Science and Mobile Computing, 2(5), 145-154. |
|
125 |
|
Naveenkumar, S. K., & Panduranga, H. T. (2013, July). Partial image encryption for smart camera. In Recent Trends in Information Technology (ICRTIT), 2013 International Conference on (pp. 126-132). IEEE. |
|
126 |
|
Varela, D. T. (2012).How to avoid the n-1 attack without costly implementations. International Journal of Network Security & Its Applications, 4(4), 109. |
|
127 |
|
Shahri, A. B., Ismail, Z., & Rahim, N. Z. Cultivating of Human’s Behavior Toward Security Effectiveness in Health Information System. |
|
128 |
|
Tenorio, Á. F., Gaballah, M. S., & Ferreira, M. A. M. (2012). Technical editor A. Xankishiyev. |
|
129 |
|
Andrade, M., & Ferreira, M. A. M. (2012). Crime scene investigation with Bayesian probabilistic expert systems. Applied Mathematics, 2(2), 7-10. |
|
130 |
|
Andrade, M., & Ferreira, M. A. M. (2012). THE PROBLEM OF CIVIL AND CRIMINAL IDENTIFICATION-BAYESIAN NETWORKS APPROACH. Technical editor A. Xankishiyev, 103. |
|
131 |
|
Taherdoost, H., Sahibuddin, S., Ibrahim, S., Kalantari, A., & Jalaliyoon, N. (2012). Classification of Internet Products and Evaluation of Application Utilization Based on the Product Fulfillment Process. In 3rd European Conference of Computer Science. |
|
132 |
|
Andrade, M., & Ferreira, M. A. M. (2012). Civil and criminal identification with Bayesian networks. |
|
133 |
|
Kingsley, L., & Worker, M. The implementation of an intelligent digital rights management platform in the health care field. |
|
134 |
|
Taherdoost, H., Sahibuddin, S., Namayandeh, M., Jalaliyoon, N., Kalantari, A., & Chaeikar, S. S. (2012). Smart Card Adoption Model: Social and Ethical Perspectives. Science, 3(4). |
|
135 |
|
Vadgama, V., Tanti, B., Modi, C., & Doshi, N. (2012). A novel approach for e-payment using virtual password system. arXiv preprint arXiv:1208.3859. |
|
136 |
|
Divya, D., & Chugh, A. (2012). Honeymaze: a hybrid intrusion detection system. International Journal of Advances in Engineering & Technology, 4(1). |
|
137 |
|
Rajagopal, R., & Chitra, M. (2012, July). Trust based interoperability security protocol for grid and Cloud computing. In Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on (pp. 1-5). IEEE. |
|
138 |
|
Chhotaray, S. K. (2012). Asymmetric Image Encryption based on Cipher Matrices. |
|
139 |
|
Panduranga, H. T., Sharath Kumar, H. S., & Naveen Kumar, S. K. (2012, December). Hybrid approach for dual image encryption using nibble exchange and Hill-cipher. In Machine Vision and Image Processing (MVIP), 2012 International Conference on (pp. 101-104). IEEE. |
|
140 |
|
Shami, F., Shamsafar, F., & Seyedarabi, H. (2012). Securing Database of Biometric Systems. Database, 7, 6. |
|
141 |
|
Sinduja, R., Sathiya, R. D., & Vaithiyanathan, V. (2012, March). Sheltered iris attestation by means of Visual Cryptography (SIA-VC). In Advances in Engineering, Science and Management (ICAESM), 2012 International Conference on (pp. 650-655). IEEE. |
|
142 |
|
Kumar, N. S., & Purusothaman, T. (2012). SEGKMS: Scalable and Efficient Group Key Management Scheme in Multicast Networks. European Journal of Scientific Research, 89(3), 394-408. |
|
143 |
|
Azeez, A., & Preetha, K. G. (2012, October). A novel approach for dynamic leader election and key based security in MANET clusters for the secured data distribution. In Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology (pp. 52-56). ACM. |
|
144 |
|
Dalal, R., Singh, Y., & Khari, M. (2012). A review on key management schemes in MANET. International Journal of Distributed and Parallel Systems, 3(4), 165. |
|
145 |
|
KITM, K., & HCTM, K. Secure Personal Recognition System based on Hashes Keys. |
|
146 |
|
Kumar, D., & Anand, B. Evaluation of RS-Analysis Proficiency by Genetic Algorithm for Robust Steganography using IWT. |
|
147 |
|
Diwakar, M., & Sharma, P. Fingerprint Template Protection using Steganography. |
|
148 |
|
Cauvery, N. K. Empirical Computation Of Rs-Analysis For Building Robust Steganography Using Integer Wavelet Transform And Genetic Algorithm. |
|
149 |
|
Dey, S. (2012, July). SD-AEI: An advanced encryption technique for images. In Digital Information Processing and Communications (ICDIPC), 2012 Second International Conference on (pp. 68-73). IEEE. |
|
150 |
|
Kushwah, V. S., & Sharma, G. (1985). Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network. International Journal of Computer Science and Security, 4(6), 551. |
|
151 |
|
Gadiparthi, M., Paladugu, R., Paladugu, S., & Vejendla, M. A Fuzzy QOS Key Base Secured MANET Routing with Multipath Data Fragmentation (FQKSMR). |
|
152 |
|
Dewangan, S., Pandey, M. S., & Khan, M. I. Design of a Cryptosystem Using Two-Level Hill Cipher. |
|
153 |
|
Mobarhan, M. A., Mobarhan, M. A., & Shahbahrami, A. Evaluation of Security Attacks on Different Mobile Communication Systems. |
|
154 |
|
Mobarhan, M. A., Mobarhan, M. A., & Shahbahrami, A. (2012). Evaluation of security attacks on UMTS authentication mechanism. International Journal of Network Security & Its Applications, 4(4), 37-52. |
|
155 |
|
Dey, S. (2012, June). SD-EI: A cryptographic technique to encrypt images. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on (pp. 28-32). IEEE. |
|
156 |
|
Heenaye, M., & Khan, M. (2012). A multimodal hand vein biometric based on score level fusion. Procedia Engineering, 41, 897-903. |
|
157 |
|
Panduranga, H. T., & Kumar, S. N. (2012). Advanced partial image encryption using two-stage hill cipher technique. International Journal of Computer Applications (0975-8887), 60(16). |
|
158 |
|
Kaur, R. Article: Developing a Benchmark Model for Image Digital Watermarking}. International Journal of Applied, 3, 30-34. |
|
159 |
|
Kaur, R. (2012). Developing a Benchmark Model for Image Digital Watermarking. In International Journal of Applied Information Systems (IJAIS)–ISSN: 2249-0868 Foundation of Computer Science FCS. |
|
160 |
|
Chitla, A., & Mohan, M. C. (2012). Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of Elliptic Curve Cryptography (ECC). International Journal of Computer Applications, 57(6). |
|
161 |
|
Hussein, J. A. (2012). Luminance-based embedding approach for color image watermarking. International Journal of Image, Graphics and Signal Processing (IJIGSP), 4(3), 49. |
|
162 |
|
Panduranga, H. T. (2012). Encryption approach for images using bits rotation reversal and extended hill cipher techniques. International journal of computer applications, 59(16). |
|
163 |
|
Selvi, A. K., & Sathik, M. M. (2012). Secret Sharing Scheme for Image Encryption Based on Primitive Root Theorem. International Journal of Control and Automation, 5(3), 37-46. |
|
164 |
|
Panduranga, H. T. (2012). Hybrid Approach for Image Encryption Using Hill Cipher Technique. In Wireless Networks and Computational Intelligence (pp. 200-205). Springer Berlin Heidelberg. |
|
165 |
|
Kolli, M. K., & Arimanda, S. R. (2011). Performance study of security mechanism for mobile agent domain. |
|
166 |
|
May, M., & George, S. (2011, May). Using students tracking data in E-learning: Are we always aware of security and privacy concerns?. In Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on (pp. 10-14). IEEE. |
|
167 |
|
Shanmugam, P., & Loganathan, C. (2011). Involutory Matrix In Visual Cryptography. a a, 22, 21. |
|
168 |
|
Sathik, M. M. (2011). Polynomial based secret sharing scheme for image encryption based on mathematical theorem. International Journal of Advanced Research in Computer Science, 2(1). |
|
169 |
|
Andrade, M., & Ferreira, M. A. M. (2011). Crime scene investigation with probabilistic expert systems. International Journal of Academic Research, 3(3 Part I), 7-15. |
|
170 |
|
Andrade, M., & Ferreira, M. A. M. (2011). Paternities Search in a very uncommon situation through object-oriented Bayesian networks. Journal of Mathematics and Technology. |
|
171 |
|
Gaballah, M. S., Ferreira, M. A. M., & Axinte, E. (2011). Ángel F. Tenorio, Prof. Dr. |
|
172 |
|
Acharya, B., Thomas, N., Arasu, D. R., & Prasad, N. V. (2011, February). Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices. In Proceedings of the 2011 International Conference on Communication, Computing & Security (pp. 606-609). ACM. |
|
173 |
|
Andrade, M., Ferreira, M. A. M., & UNIDE-IUL, L. P. (2011). FORENSIC IDENTIFICATION WITH BAYES’LAW. Ángel F. Tenorio, Prof. Dr., 206. |
|
174 |
|
May, M., & Sébastien, G. (2011).Privacy Concerns in E-learning: Is Using Tracking System a Thread. International Journal of Information and Education Technology, 1(1), 1-8. |
|
175 |
|
Paunwala, M. C., & Patnaik, S. (2011). Biometric Template Protection With Robust Semi–Blind Watermarking Using Image Intrinsic Local Property. International Journal of Biometrics and Bioinformatics (IJBB), 5(2), 28. |
|
176 |
|
Pal, O., Saxena, A., Kumawat, U., Batra, R., & Saquib, Z. (2011). Secure Group Deffie-Hellman Key Exchange with ID Based Cryptography. In Computer Networks and Information Technologies (pp. 498-503). Springer Berlin Heidelberg. |
|
177 |
|
Ferraz, L. H. G. (2011). Um mecanismo de exclusao acurado e preciso baseado em confiança para controle de acesso em redes ad hoc (Doctoral dissertation, Universidade Federal do Rio de Janeiro). |
|
178 |
|
Gadiparthi, M., Vejendla, M., Paladugu, R., & Rao, P. N. (2011). A Unique Light Weight Time Stamp Based Distributed Security Protocol for Wireless Ad hoc Network. Wireless Communication, 3(2), 95-102. |
|
179 |
|
Ling, A. P. A., & Masao, M. (2011). Grid Information Security Functional Requirement-Fulfilling Information Security of a Smart Grid System. arXiv preprint arXiv:1108.0267. |
|
180 |
|
Senekane, M., Qhobosheane, S., & Taele, B. M. (2011). Elliptic Curve Diffie-Hellman Protocol Implementation Using Picoblaze. IJCSNS, 11(6), 30. |
|
181 |
|
Khan, N. M., & Khan, N. M. (2011, December). Dorsal hand vein biometric using Independent Component Analysis (ICA). In Internet Technology and Secured Transactions (ICITST), 2011 International Conference for (pp. 191-195). IEEE. |
|
182 |
|
Prasad, A., Chaurasia, S., Singh, A., & Gour, D. (2010). Mapping Cloud computing onto useful E-Governance. International Journal of Computer Science, 8(5). |
|
183 |
|
Sathik, M. M., & Selvi, A. K. (2010). An Image Encryption Decryption Method Using Secret Based Transformation Matrix. Digital Image Processing, 2(10), 401-404. |
|
184 |
|
Revenkar, P. S., Anjum, A., & Gandhare, W. Z. (2010). Secure iris authentication using visual cryptography. arXiv preprint arXiv:1004.1748. |
|
185 |
|
Varghese, J. (2010). Image Encryption and Compression using Embedding Technique (Doctoral dissertation, Christ University). |
|
186 |
|
Acharya, B., Sharma, M. D., Tiwari, S., & Minz, V. K. (2010). Privacy protection of biometric traits using modified hill cipher with involutory key and robust cryptosystem. Procedia Computer Science, 2, 242-247. |
|
187 |
|
Dey, S. C., Das, R., Nath, S. S., & Bhattacherjee, R. (2010). Photo-luminescence of CdSe quantum dots suspended in liquid paraffin. OPTOELECTRONICS AND ADVANCED MATERIALS-RAPID COMMUNICATIONS, 4(11), 1721-1723. |
|
188 |
|
Andrade, M., & Ferreira, M. A. M. (2010). Civil identification problems with Bayesian networks using official DNA databases. Aplimat-Journal of Applied Mathematics, 3(3), 155-162. |
|
189 |
|
Andrade, M., & Ferreira, M. A. M. (2010). Solving civil identification cases with DNA profiles databases using Bayesian networks. Journal of Mathematics and Technology, 1(2), 37-40. |
|
190 |
|
Kathuria, M. (2010). Performance Enhancement of Identification System using Vein Biometric with Modified Run Length Encoding, Stegnography and Cryptography. International Journal of Computer Applications, 12(8), 1-5. |
|
191 |
|
Tapaswi, S., & Kushwah, V. S. (2010, June). Securing Nodes in MANETs Using Node Based Key Management Scheme. In Advances in Computer Engineering (ACE), 2010 International Conference on (pp. 228-231). IEEE. |
|
192 |
|
Dey, S. C., Das, R., Nath, S. S., & Bhattacherjee, R. (2010). Fluorescence study of CdSe quantum dots suspended in liquid paraffin. Nano, 5(06), 357-359. |
|
193 |
|
Kane, A. M. (2010).On the use of continued fractions for electronic cash. International Journal of Computer Science and Security, 4(1), 136-148. |
|
194 |
|
Khoury, I., & Caushaj, E.computer forensic. |
|
195 |
|
Bhanwar, S., & Bawa, S. (2010). TUX-INTERO: A Portal for secure interoperation of Grids. Int. J. Eng. Sci. Technol, 2, 3335-3343. |
|
196 |
|
Bhanwar, S., & Bawa, S. (2010). Reputation Enhancement in a Trust Management System. In Recent Trends in Network Security and Applications (pp. 440-451). Springer Berlin Heidelberg. |
|
197 |
|
Bawa, S. (2010). Interoperability: Bridging the Gap. International Journal of Computer Applications, 7(12). |
|
198 |
|
Kane, A. M. (2010). On the use of continued fractions for electronic cash. International Journal of Computer Science and Security, 4(1), 136-148. |
|
199 |
|
Vellanki, U. S., Varanasi, A., & Kumar, S. U. (2010). Advanced Hill Cipher Handling the Entire Plaintext as a Single Block. International Journal of Advanced Research in Computer Science, 1(4). |
|
200 |
|
Selvi, A. K., & Sathik, D. M. M. (2010). Multimedia Security Using Secret Sharing Scheme for Image Encryption. International Journal of Computer AND Internet Security, 57-66. |
|
201 |
|
Andrade, M., & Ferreira, M. A. M. (2009).Criminal and civil identification with DNA databases using Bayesian networks. International Journal of Security, 3(4), 65-74. |
|
202 |
|
Adnan, A., Cazan, A., Safa, M., Lung, A. W. M., & Williams, G. (2009). Evaluation of potential manufacturing suppliers using analytical hierarchy process and cluster analysis for benchmarking. International Journal of Security, 3(3), 36. |
|
203 |
|
Majhi, J. (2009).Modified hill-cipher and crt methods in galois field gf (2 m) for cryptography (Doctoral dissertation, National Institute Of Technology Rourkela). |
|
204 |
|
Adnan, A., Cazan, A., Safa, M., Lung, A. W. M., & Williams, G. (2009). Evaluation of potential manufacturing suppliers using analytical hierarchy process and cluster analysis for benchmarking. International Journal of Security, 3(3), 36. |
|
205 |
|
Andrade, M., & Ferreira, M. A. M. (2009). Criminal and civil identification with DNA databases using Bayesian networks. International Journal of Security, 3(4), 65-74. |
|
206 |
|
Aboud, S. J. (2009). Secure E-payment Protocol. International Journal of Computer Science and Security, 3(3). |
|
207 |
|
Hamamreh, R. A., & Farajallah, M. (2009). Design of a robust cryptosystem algorithm for non-invertible matrices based on hill cipher. International Journal of Computer Science and Network Security, 11-16. |
|
208 |
|
Panigrahy, S. K., Jena, D., Korra, S. B., & Jena, S. K. (2009). On the privacy protection of biometric traits: palmprint, face, and signature. In Contemporary Computing (pp. 182-193). Springer Berlin Heidelberg. |
|
209 |
|
S. Mansor,R bin Din, A. Samsudin. "Analysis of Natural Language Steganography". International Journal of Computer Science and Security (IJCSS), 3(2):62-153, 2009 |
|
210 |
|
Mansor, S., Din, R., & Samsudin, A. (2009). Analysis of natural language steganography. International Journal of Computer Science and Security (IJCSS), 3(2), 113. |
|
211 |
|
Acharya, B., Patra, S. K., & Panda, G. (2009). Involutory, permuted and reiterative key matrix generation methods for Hill cipher system. matrix, 2, 1. |
|
212 |
|
Acharya, B., Panigrahy, S. K., Patra, S. K., & Panda, G. (2009). Image encryption using advanced hill cipher algorithm. International Journal of Recent Trends in Engineering, 1(1). |
|
213 |
|
Kaur, M., & Sofat, S. (2009). A Review on Biometrics Security Breaches and Remedies. Biometrics and Bioinformatics, 1(8), 92-98. |
|
214 |
|
Nath, S. S., Chakdar, D., Gope, G., & Avasthi, D. K. (2008). Effect of 100 MeV nickel ions on silica coated ZnS quantum dots. Journal of Nanoelectronics and Optoelectronics, 3(2), 180-183. |
|
215 |
|
Panigrahy, S. K., Acharya, B., & Jena, D. (2008). Image encryption using self-invertible key matrix of hill cipher algorithm. |
|
216 |
|
Racheal, B. O., & Adeosun, O. O. (2016). Employing The Use of Steganography for The Secured Transmission of Information In Mobile Devices. |
|
|
|