Computer Science & Engineering Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 122
Issue DateTitleAuthor(s)
2009Secure Group Communication Using Binomial TreesAparna, R.; Amberker, B.B.; Pola, Divya; Bathia, Pranjal
2009Multi-use Unidirectional Forward-Secure Proxy Re-signature SchemeSunitha, N.R.; Amberker, B.B.
2008FORWARD-SECURE PROXY SIGNATURE AND REVOCATION SCHEME FOR A PROXY SIGNER WITH MULTIPLE ORIGINAL SIGNERSAmberker, B.B; Sunitha, N.R
2009Privacy Preservation in k-Means Clustering by Cluster RotationDhiraj, S. S. Shivaji; Asif Khan, Ameer M.; Khan, Wajhiulla; Challagalla, Ajay
2009Methods to solve Discrete Logarithm Problem for Ephemeral KeysPadmavathy, R.; Bhagvati, Chakravarthy
2010Unknown Key Share Attack on STPKE’ ProtocolPadmavathy, R.; Bhagvati, Chakravarthy
2010Developing a Web Recommendation System Based on Closed Sequential PatternsNiranjan, Utpala; Subramanyam, R.B.V.; Khanaa, V.
2010SEEDA : Secure End-to-End Data Aggregation in Wireless Sensor NetworksPoornima, A.S.; Amberker, B.B.
2010Agent Based Secure Data Collection in Heterogeneous Sensor networksPoornima, A.S.; Amberker, B.B
2010ERFLA: Energy Efficient Combined Routing, Fusion, Localization Algorithm in Cognitive WSNLakshmi Phani, G.; Venkat Sayeesh, K.; Vinod Kumar, K.; Rama Murthy, G
2008A Data Perturbation Method by Field Rotation and Binning by Averages Strategy for Privacy PreservationKadampur, Mohammad Ali; Somayajulu, D.V.L.N
2008Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers using Bellare-Miner Scheme with Proxy RevocationSunitha, N.R; Amberker, B.B
2008A New Approach to Securing Broadcast data in Sensor NetworksPoornima, A.S; Amberker, B.B
2008A Secure Group Key Management Scheme for Sensor NetworksPoornima, A.S; Amberker, B.B
2008Authenticated Secure Group Communication using Broadcast Encryption Key ComputationAparna, R; Amberker, B.B
2008Distributed Key Management Technique for Reliable Secure Group CommunicationPoornima, A.S; Amberker, B.B
2008Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature SchemeSunitha, N.R; Amberker, B.B; Koulgi, Prashant
2008Compiler-Controlled Extraction of ComputationCommunication Overlap in MPI ApplicationsDas, Dibyendu; Gupta, Manish; Ravindran, Rajan; Shivani, W; Sivakeshava, P; Uppal, Rishabh
2008Forward-Secure Multi-signaturesSunitha, N.R; Amberker, B.B
2008MEDICAL IMAGE COMPRESSION USING ADVANCED CODING TECHNIQUESridhar, K.V; Krishna Prasad, K.S.R
Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 122