Found about 4 results
Downloads: 121
Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015
689 - 692Providing Kerberos Authentication Using Elliptic Curve Cryptography
Monalisha Mishra | G. Sujatha [4]
Downloads: 114
Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015
2443 - 2447Separable Reversible Data Hiding In Image Using a Keyless Approach
Jitbahan Samanta | G. Sujatha [4]
Downloads: 112
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 2, February 2015
2430 - 2432Highly Secured Lossless Image Cryptography Algorithm Based on Haar Wavelet Transform
Rishi Kumar Gupta [8] | G. Sujatha [4]
Downloads: 86
Survey Paper, Information Technology, India, Volume 4 Issue 3, March 2015
1315 - 1318SIP Over NON-TLS vs TLS Environment
Prapti Priya Nayak | G. Sujatha [4]