To search, Click below search items.
All Published Papers Search Service
Title
Enhancing Cloud Security Using VKC as a Service
Author
Syed Saqib Raza Rizvi, Muhammad Asad Ullah, Sagheer Abbas, Shahid Naseem
Vol. 17 No. 6 pp. 185-190
Keywords
Cryptography, AES, VKC, Privacy, Threats.
Centroid Energy-Based Sleep Scheduling Design in Dense Wireless Sensor Networks using Evolutionary Algorithms
Seyed Mojtaba Hosseinirad¢Ó
Vol. 17 No. 6 pp. 171-184
Sleep scheduling, wireless sensor network, LEACH, SEP, energy conservation.
Hiding Encrypted Data into Audio File
Hazem Kathem Qattous
Vol. 17 No. 6 pp. 162-170
Cryptography . Steganography . Pohlig-Hellman . One-Time-Pad . Least Significant Bit . Text Compression
A Useful Implementation of Medical Image Registration for Brain Tumor Growth Investigation in a Three Dimensional Manner
Emrah Irmak©ö, Mustafa Burak T?RK?Z©÷
Vol. 17 No. 6 pp. 155-161
Geometrical Transformation, 3D Medical Image Registration, Optimization, Tumor Growth