Browsing by Title

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 3585 to 3604 of 4328 < previous   next >
Issue DateTitleAuthor(s)
Jan-2023A second order optimal hybrid scheme for singularly perturbed semilinear parabolic problems with interior layersPriyadarshana, S.; Mohapatra, J.
Dec-2011A Secure and EfficientMessage Authentication Protocol for VANETs with Privacy PreservationMishra, B; Panigrahy, S K; Tripathy, T C; Jena, D; Jena, S K
2009A Secure AODV Routing Scheme with Reduced Data Packet Delay in MANETMishra, Alekha Kumar; Sahoo, Bibhudatta
2002Secure Database Design, A comparison of Object database vs. Relational Database Security at SQL levelSahoo, Bibhudatta; Balaram Prasad, M
Mar-2010A Secure e-Shopping Using Voice OrderingPanigrahy, S K; Jena, D; Jena, S K
Mar-2019A Secure Key Management and Authentication Protocol for Virtualized-BBU in C-RAN ArchitectureYadav, Awaneesh Kumar; Mahapatra, Byomakesh; Turuk, Ashok Kumar
May-2017Secure Key-distribution in IoT Cloud NetworksMoharana, Soumya Ranjan; Addya, Sourav Kanti; Satpathy, Anurag; Turuk, Ashok Kumar; Majhi, Banshidhar; Jha, V K
Feb-2018A Secure Lightweight Mutually Authenticated Radio Frequency Identification (RFID) ProtocolKumar, Varinder; Mohanty, Sujata
2010A Secure Multi authority Electronic Voting Protocol based on Blind SignatureMohanty, Sujata; Majhi, B
Jun-2017A Secure VM Consolidation in Cloud Using Learning AutomataMishra, Sambit Kumar; Sahoo, Bibhudatta; Jena, Sanjay Kumar
Mar-2019Secured IoT devices management in Cloud-Fog Environment using BlockchainBiswal, Asutosh Kumar; Addya, Sourav Kanti; Sahoo, Bibhudatta; Turuk, Ashok Kumar
Sep-2022Secured Monitoring of Unauthorized UAV by Surveillance Drone Using NS2Mandal, Priti; Roy, Lakshi Prosad; Das, Santos Kumar
Jul-2018A Secured Patients Monitoring System Using Sensor Nodes in Health Care InstitutionsKhilar, Pabitra Mohan; Khatua, Swasti Sadhan; Swain, Rakesh Ranjan
Dec-2015A secured SDN framework for IoTSahoo, K S; Sahoo, Bibhudatta; Panda, A
2009Securing FSR against Data Packet Dropping by Malicious NodesSenapati, Sunil Kumar; Khilar, Pabitra Mohan
Dec-2016Securing IEEE 1687 Standard On-chip Instrumentation Access using PUFSudeendra Kumar, K; Satheesh, N; Mahapatra, A; Sahoo, S; Mahapatra, K K
Mar-2018Security and Privacy Solution for I-RFID based Smart Infrastructure Health MonitoringKumar, Shailesh; Mahapatra, Byomakesh; Kumar, Rahul; Turuk, Ashok Kumar
Dec-2017Security Enhancements to System on Chip Devices for IoT Perception LayerKumar K, Sudeendra; Sahoo, Sauvagya; Mahapatra, Abhishek; Swain, Ayas Kanta; Mahapatra, K. K
Jun-2021Security Improvement and Privacy Preservation in E-HealthKishore, Pushkar; Barisal, Swadhin Kumar; Kumar, Kulamala Vinod; Mohapatra, Durga Prasad
Feb-2011Security in Bluetooth, RFID and Wireless Sensor NetworksPanigrahy, S K; Jena, S K; Turuk, A K