Manuscript Submission for IJCSMA
Submit articles via Scholars Central
Research Article
PROXY RE-ENCRYPTION USING HYBRID ENCRYPTION SCHEME SECURE AGAINST CHOSEN CIPHERTEXT ATTACK
COLLECTION OF WEB OPINION INFORMATION AND VISUALIZATION BASED ON SDC
EFFICIENT INCENTIVE COMPATIBLE MODEL FOR SECURE DATA SHARING
PART-BASED PEDESTRIAN DETECTION AND TRACKING USING HOG-SVM CLASSIFICATION
Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs
Security Analysis of Visual Secret Sharing Scheme
Anti-Phishing Framework for Banking Based on Visual Cryptography
OVERCOME VAMPIRE ATTACKS PROBLEM IN WIRELESS AD-HOC SENSOR NETWORK BY USING DISTANCE VECTOR PROTOCOLS
Diagnostic Group Socio Behaviors Using Dim Extractions
HIDING PACKET SEND THROUGH MULTIPLE TRANSMISSION LINE BY VIRTUALLY IN AD HOC
Securing Sensitive Information in Social Network Data Anonymization
GPSR GEOGRAPHICAL ROUTING PROTOCOL USING MANET
OBJECT TRACKING AND RECOGNITION FOR REAL TIME VIDEOS USING NAIVE ? BAYES CLASSIFICATION
PRIVACY PROTECTION AGAINST WORMHOLE ATTACKS IN MANET
BIOMETRIC AUTHENTICATION SYSTEM USING FINGER VEIN
RBM: Rule Based Lexical Meaning Extraction in Video Data Using Fuzzy
Research Letter
A Novel Scheme for Live Streaming Evolution Networks
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage