Found about 7 results
Downloads: 145
Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017
455 - 458Survey on: Privacy Strategy Presumption for Users Content on Sharing Sites
Nilesh N. Sahastrabuddhe | N. D. Kale [7]
Downloads: 139
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
51 - 53A Survey on Detection of Jamming Attacks in Time-Critical Wireless Applications
Sheetal S Shete | N. D. Kale [7]
Downloads: 125
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
352 - 354An Approach for On-Demand Scalability in Platform as a Service
Manodaya B. Gavali [2] | N. D. Kale [7]
Downloads: 116
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
1169 - 1173Shadow Attacks Based on Password Patterns Password Reuses
Bhavika Garase | N. D. Kale [7]
Downloads: 114
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
1805 - 1807A Survey on CloudNCFS: Building Network-Coding-Based Distributed Storage System
Pranjali A. Pali | N. D. Kale [7]
Downloads: 110
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017
2530 - 2533Shadow Attacks Based On Password Patterns Password Reuses
Bhavika Garse | N. D. Kale [7]
Downloads: 107
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
1235 - 1237Single Sign-on Secure Password Mechanism for Distributed Computer Networks
Deepali M. Devkate | N. D. Kale [7]