Issue Title
Vol 24, No 1 (2017) Security Analysis of Digital Signature Scheme with Message Recovery using Self-Certified Public Keys Abstract  PDF
Mahshid Sadeghpour
Vol 22, No 1 (2016) Mouse Jacking: A Survey Abstract  PDF
Varun Chitale, Anandita Bodas
Vol 18, No 1 (2015) Ensuring Data Security in Cloud Computing Using Huffman Encryption Abstract
Karmen Biswas
Vol 8, No 1 (2013) Ensuring Data Security in Cloud Computing Using encryption Abstract
Karmen Biswas
Vol 29, No 1 (2018) A Study on Text Based Steganography Using Email Platform and Color Mapping Abstract  PDF
Amanpreet Kaur, Sukhvir Kaur, Gunjan Sethi
Vol 26, No 1 (2017) Development of a Secure Mobile E-Banking System Abstract  PDF
Raphael Olufemi Akinyede, Odoseiye Aidohelen Esese
Vol 25, No 1 (2017) Secure Data Sharing in Cloud Computing: A Comprehensive Review Abstract  PDF
Muthi Reddy P, Manjula S. H., Venugopal K. R.
1 - 7 of 7 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"