Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 122
| Issue Date | Title | Author(s) |
| 2009 | Secure Group Communication Using Binomial Trees | Aparna, R.; Amberker, B.B.; Pola, Divya; Bathia, Pranjal |
| 2009 | Multi-use Unidirectional Forward-Secure Proxy Re-signature Scheme | Sunitha, N.R.; Amberker, B.B. |
| 2008 | FORWARD-SECURE PROXY SIGNATURE AND REVOCATION SCHEME FOR A PROXY SIGNER WITH MULTIPLE ORIGINAL SIGNERS | Amberker, B.B; Sunitha, N.R |
| 2009 | Privacy Preservation in k-Means Clustering by Cluster Rotation | Dhiraj, S. S. Shivaji; Asif Khan, Ameer M.; Khan, Wajhiulla; Challagalla, Ajay |
| 2009 | Methods to solve Discrete Logarithm Problem for Ephemeral Keys | Padmavathy, R.; Bhagvati, Chakravarthy |
| 2010 | Unknown Key Share Attack on STPKEā Protocol | Padmavathy, R.; Bhagvati, Chakravarthy |
| 2010 | Developing a Web Recommendation System Based on Closed Sequential Patterns | Niranjan, Utpala; Subramanyam, R.B.V.; Khanaa, V. |
| 2010 | SEEDA : Secure End-to-End Data Aggregation in Wireless Sensor Networks | Poornima, A.S.; Amberker, B.B. |
| 2010 | Agent Based Secure Data Collection in Heterogeneous Sensor networks | Poornima, A.S.; Amberker, B.B |
| 2010 | ERFLA: Energy Efficient Combined Routing, Fusion, Localization Algorithm in Cognitive WSN | Lakshmi Phani, G.; Venkat Sayeesh, K.; Vinod Kumar, K.; Rama Murthy, G |
| 2008 | A Data Perturbation Method by Field Rotation and Binning by Averages Strategy for Privacy Preservation | Kadampur, Mohammad Ali; Somayajulu, D.V.L.N |
| 2008 | Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers using Bellare-Miner Scheme with Proxy Revocation | Sunitha, N.R; Amberker, B.B |
| 2008 | A New Approach to Securing Broadcast data in Sensor Networks | Poornima, A.S; Amberker, B.B |
| 2008 | A Secure Group Key Management Scheme for Sensor Networks | Poornima, A.S; Amberker, B.B |
| 2008 | Authenticated Secure Group Communication using Broadcast Encryption Key Computation | Aparna, R; Amberker, B.B |
| 2008 | Distributed Key Management Technique for Reliable Secure Group Communication | Poornima, A.S; Amberker, B.B |
| 2008 | Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature Scheme | Sunitha, N.R; Amberker, B.B; Koulgi, Prashant |
| 2008 | Compiler-Controlled Extraction of ComputationCommunication Overlap in MPI Applications | Das, Dibyendu; Gupta, Manish; Ravindran, Rajan; Shivani, W; Sivakeshava, P; Uppal, Rishabh |
| 2008 | Forward-Secure Multi-signatures | Sunitha, N.R; Amberker, B.B |
| 2008 | MEDICAL IMAGE COMPRESSION USING ADVANCED CODING TECHNIQUE | Sridhar, K.V; Krishna Prasad, K.S.R |
Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 122