DSpace@nitr >

Items for Author Jena, S K in All of DSpace

Return to Browse by Author
Sort by Title Sorting by Date

Showing 48 items.

Date of IssueTitle Authors
1981 Similarity solutions for laminar free convection flow of a thermomicropolar fluid past a non-isothermal vertical flat plateJena, S K; Mathur, M N
1982 Free Convection in the Laminar Boundary Layer Flow of a Thermomicropolar Fluid past a Vertical Flat Plate with Suction/InjectionJena, S K; Mathur, M N
1983 On the stability of a hot layer of micropolar fluidJena, S K; Bhattacharyya, S P
1984 Mixed convection flow of a micropolar fluid from an isothermal vertical plateJena, S K; Mathur, M N
1986 The effect of microstructure on the thermal convection in a rectangular box of fluid heated from belowJena, S K; Bhattacharyya, S P
2007 Blind Steganalysis: Estimation of Hidden Message LengthJena, S K; Krishna, G V V
2007 A Novel Secure Key Agreement Protocol using Trusted Third PartyKulkarni, S; Jena, D; Jena, S K
2007 A Novel Blind Signature Scheme Based on Nyberg-Rueppel Signature Scheme and Applying in off-line Digital CashJena, D; Jena, S K; Majhi, B
2007 A Novel Untraceable Blind Signature Based on Elliptic Curve Discrete Logarithm ProblemJena, D; Jena, S K; Majhi, B
2008 A novel protocol for smart card using ECDLPJena, D; Panigrahy, S K; Biswal, P K; Jena, S K
2008 A Novel ECDLP-Based Blind Signature SchemeJena, D; Panigrahy, S K; Acharya, B; Jena, S K
2008 An Efficient Palmimprint Image Recognition SystemPanigrahy, S K; Jena, D; Jena, S K
2008 A Novel ECDLP-Based Blind Signature Scheme with an IllustrationJena, D; Jena, S K; Majhi, B; Panigrahy, S K
2008 Improved Offline Signature Verification Scheme using Feature Point Extraction MethodJena, D; Majhi, B; Panigrahy, S K; Jena, S K
2008 Improved Offline Signature Verification Scheme using Feature Point Extraction MethodJena, D; Majhi, B; Panigrahy, S K; Jena, S K
2008 A Genetic Algorithm Based Dynamic Load Balancing Scheme for Heterogeneous Distributed SystemsSahoo, Bibhudatta; Mohapatra, Sudipta; Jena, S K
2008 A Rotational- and Translational-Invariant Palmprint Recognition SystemPanigrahy, S K; Jena, D; Jena, S K
29-Jul-2008 A Novel Protocol for Smart Card Using ECDLPJena, D; Panigrahy, S K; Biswal, P K; Jena, S K
16-Aug-2008 Improved Offline Signature Verification Scheme Using Feature Point Extraction MethodJena, D; Majhi, B; Panigrahy, S K; Jena, S K
2009 New Approach for Testing the Correctness of Access Control PoliciesSharma, S; Jena, S K; Korra, S B
2009 Modeling and Analysis to Estimate the Performance of Heterogeneous ClusterChandra, Pushpendra Kumar; Sahoo, Bibhudatta; Jena, S K
Jan-2009 A Novel Remote User Authentication Scheme using Smart Card based on ECDLPJena, D; Jena, S K; Mohanty, D; Panigrahy, S K
Jan-2009 A Novel Visual Cryptography SchemeJena, D; Jena, S K
Mar-2009 Dynamic Approach for Web Services SelectionPandey, A; Jena, S K
19-Aug-2009 On the Privacy Protection of Biometric Traits: Palmprint, Face, and SignaturePanigrahy, S K; Jena, D; Korra, S B; Jena, S K
Dec-2009 A Fault Model for Testing the Access Control Policies using Classified Mutation OperatorSharma, S; Jena, S K
Dec-2009 Improved query plans for unnesting nested SQL queriesKhaitan, P; Satish, K M; Korra, S B; Jena, S K
Dec-2009 Approximation algorithms for optimizing privacy and utilityKhaitan, P; Korra, S B; Jena, S K; Majhi, B
Dec-2009 A Modified Remote User Authentication Scheme using Smart Card based on ECDLPJena, D; Panigrahy, S K; Jena, S K; Pani, S K
Dec-2009 A Novel and Efficient Cryptosystem for Long Message EncryptionJena, D; Panigrahy, S K; Jena, S K
Mar-2010 Active Datawarehouse Loading by GUI Based ETL ProcedureReddy, V M; Jena, S K; Rao, M N
Mar-2010 A Secure e-Shopping Using Voice OrderingPanigrahy, S K; Jena, D; Jena, S K
Jul-2010 Active Datawarehouse Loading by Tool Based ETL ProcedureReddy, V M; Jena, S K
Jul-2010 An Extended Approach to Personalize the Web Search by Measuring the User RelevanceJena, S K; Kumar, V; Ashok, S O
Dec-2010 SCMRP: Secure Cluster Based Multipath Routing Protocol for Wireless Sensor NetworksSharma, S K; Jena, S K
2011 Man-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple PairingMutchukota, T R; Panigrahy, S K; Jena, S K
Jan-2011 Anomaly Detection in Ethernet Networks Using Self Organizing MapsPanigrahy, S K; Mahapatra, J R; Mohanty, J; Jena, S K
Jan-2011 Web Usage Mining: An Implementation ViewKorra, S B; Panigrahy, S K; Jena, S K
Feb-2011 Security in Bluetooth, RFID and Wireless Sensor NetworksPanigrahy, S K; Jena, S K; Turuk, A K
Feb-2011 Evaluation of Web Application Security Risks and Secure Design PatternsDalai, A K; Jena, S K
Feb-2011 A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor NetworksSharma, S; Jena, S K
Aug-2011 Man-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple PairingMuchukota, T R; Panigrahy, S K; Jena, S K
Sep-2011 Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad hoc NetworksSingh, Y; Jena, S K
Dec-2011 A Secure and EfficientMessage Authentication Protocol for VANETs with Privacy PreservationMishra, B; Panigrahy, S K; Tripathy, T C; Jena, D; Jena, S K
Dec-2011 An Approach to Data Integrity in Web ApplicationsDalai, A K; Panigrahy, S K; Jena, S K
2012 Observing the Performance of Greedy algorithms for dynamic load balancing in Heterogeneous Distributed Computing SystemSahoo, Bibhudatta; Kumar, D; Jena, S K
Jan-2013 Analysing the Impact of Heterogeneity with Greedy Resource Allocation Algorithms for Dynamic Load Balancing in Heterogeneous Distributed Computing SystemSahoo, Bibhudatta; Kumar, D; Jena, S K
Mar-2013 Simulated Annealing based Heuristic Approach for Dynamic Load Balancing Problem on Heterogeneous Distributed Computing SystemSahoo, Bibhudatta; Jena, S K; Mahapatra, S

 

Powered by DSpace Feedback