All Stories

  1. Security Analysis of User Authentication and Methods
  2. Futuristic Prediction of Missing Value Imputation Methods Using Extended ANN
  3. Electronic Voting Application Powered by Blockchain Technology
  4. Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification
  5. Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification
  6. Understanding Blockchain
  7. Secure, Resilient and Green Computing in Wireless Sensor Networks
  8. Security and Trust Model Analysis for Banking System
  9. Efficient Solution for Load Balancing in Fog Computing Utilizing Artificial Bee Colony
  10. A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques
  11. Behavioral Modeling of Malicious Objects in a Highly Infected Network Under Quarantine Defence
  12. Energy and SLA Efficient Virtual Machine Placement in Cloud Environment Using Non-Dominated Sorting Genetic Algorithm
  13. Probabilistic Verification Scenarios with Reduced Authentication Delay for Handoff Clients in Mesh Networks
  14. Correlation and Performance Estimation of Clone Detection Tools
  15. Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN
  16. Security Against Network Layer Attacks for Hierarchal Mesh Environments
  17. Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN
  18. Deployment Consideration on Secure Computation for Radix-16 Scalar Multiplication
  19. Energy efficient virtual machine consolidation for cloud data centres using analytic hierarchy process
  20. Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification
  21. Modified AODV (MAODV) Against Black Hole in WMN
  22. Type-2 software cone detection using directed acyclic graph
  23. Aspects of Trusted Routing Communication in Smart Networks
  24. A hybrid approach for detection of Type-1 software clones
  25. Proposed IoT framework using third party with enhanced security
  26. SLA and Performance Efficient Heuristics for Virtual Machines Placement in Cloud Data Centers
  27. Weight Trusted Routing Mechanism for Hierarchical Mesh Environments
  28. Non-Trivial Software Clone Detection Using Program Dependency Graph
  29. A recent review on lightweight cryptography in IoT
  30. Novel Noncommutative Cryptography Scheme Using Extra Special Group
  31. A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security
  32. Mathematical Model for Cyber Attack in Computer Network
  33. Performance Evaluation of VM Placement Using Classical Bin Packing and Genetic Algorithm for Cloud Environment
  34. Secure Buffer-Based Routing Protocol for WMN
  35. Secure Modified Ad Hoc On-Demand Distance Vector (MAODV) Routing Protocol
  36. On Reduced Computation Cost for Edwards and Extended Twisted Edwards Curves
  37. Aspects of secure communication during spectrum handoff in cognitive radio networks
  38. Secure and Efficient ECC
  39. A Secure Authentication Scheme in Multi-operator Domain (SAMD) for Wireless Mesh Network
  40. Effective Signcryption Approach for Secure Convention for Multilayer Consensus using ECC
  41. A Fast Handoff Technique in Wireless Mesh Network (FHT for WMN)
  42. A Secure Homomorphic Routing Technique in Wireless Mesh Network (HRT for WMN)
  43. Reduced precomputed scalar multiplication cost for ECC
  44. VM Consolidation for Cloud Data Center Using Median Based Threshold Approach
  45. Various Code Clone Detection Techniques and Tools: A Comprehensive Survey
  46. Messages
  47. Experimental analysis of energy management techniques for mobile devices using cloud computing
  48. Secure Composition of ECC-PAKE Protocol for Multilayer Consensus Using Signcryption
  49. On Reduced Computational Cost, Efficient and Secure Routing (ESR) for Wireless Mesh Network
  50. Effective detection of jamming in WiMAX based communication systems
  51. Efficient hybrid watermarking approach by using SVD, DWT, and Back Propagation Neural Network
  52. Extended Cell Planning for Capacity Expansion and Power Optimization by Using MEMETIC Algorithm
  53. Computing the Spreading Power of a Business Portal to Propagate the Malicious Information in the Network
  54. Computing the Spreading Power of a Business Portal to Propagate the Malicious Information in the Network