To search, Click below search items.
All Published Papers Search Service
Title
A novel approach towards realizing optimum data transfer and Automatic Variable Key(AVK) in cryptography
Author
P. Chakrabarti, B Bhuyan, A.Chowdhuri, C.T.Bhunia
Vol. 8 No. 5 pp. 241-250
Keywords
optimum path selection, automatic variable key, quantum cryptography, AES, RSA, diffusion, message digest
Implications of Mobile Technology Usage on Learners in a Learning Process
N. Uday Bhaskar, P. Govindarajulu
Vol. 8 No. 5 pp. 251-259
Collaboration, Context, Mobile Learning, Learning Content
Abnormality Detection by Generating Random Fields Based on Markov Random Field Theory
C. NagaRaju, L.SivaSankarReddy
Vol. 8 No. 5 pp. 260-263
Image segmentation, MRF, Probability density, misclassification, clustering
A Dual Layered Encryption Algorithm for Wireless Equivalent Privacy (WEP) Algorithm
Olufade, F. W. Onifade, Adenike, O. Osofisan, Chukwuzitere, U. OBODO
Vol. 8 No. 5 pp. 264-271
IEEE 802.11, Security, Wired Equivalent Privacy, Wireless LANs (WLAN), Integrity Check Value (ICV)