To search, Click below search items.
All Published Papers Search Service
Title
An Effective Key Computation Protocol for Secure Group Communication in Heterogeneous Networks
Author
S.Jabeenbegum, T.Purusothaman, Karthi.M, Balachandar.N, Arunkumar.N
Vol. 10 No. 2 pp. 313-319
Keywords
Group Key Management, Secure Group Communication, Elliptic Curve Cryptography, Clustering, Complexity Analysis
Intrusion Detection System in UDP Protocol
K.Duraiswamy, G Palanivel
Vol. 10 No. 3 pp. 1-5
Intrusion detection systems, TCP/IP network model, UDP model, features ranking, support vector decision function
A Study on Implementation of Advanced Morphological Operations
B. Vanajakshi, B. Sujatha, K. Srirama
Vol. 10 No. 3 pp. 6-9
Morphology, Hit-or-miss, thinning, gradient
A Study of Effect of Information Security Management System[ISMS] Certification on Organization Performance
Cheol-Soon Park, Sang-Soo Jang, Yong-Tae Park
Vol. 10 No. 3 pp. 10-21
Information Security, Information Security Management System(ISMS), ISMS Certification, Business Performance