94 results on '"Jaidhar, C. D."'
Search Results
52. Security Vulnerabilities of User Authentication Scheme Using Smart Card.
53. Modified Authentication Protocol Using Elliptic Curve Cryptosystem for Virtual Subnets on Mobile Adhoc Networks
54. Windows Malware Detector Using Convolutional Neural Network Based on Visualization Images
55. Robust Smart Card Authentication Scheme for Multi-server Architecture.
56. Enhanced Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing.
57. PPRP: Predicted Position Based Routing Protocol Using Kalman Filter for Vehicular Ad-hoc Network.
58. Secure Key Exchange Scheme for IPTV Broadcasting.
59. VMI Based Automated Real-Time Malware Detector for Virtualized Cloud Environment
60. Efficient Variable Length Block Switching Mechanism.
61. Heterogeneous Graph Convolutional Networks for Android Malware Detection using Callback-Aware Caller-Callee Graphs
62. Classification of Soil Fertility using Machine Learning-based Classifier
63. Weaklier-Supervised Semantic Segmentation with Pyramid Scene Parsing Network
64. Android Malware Detection using Function Call Graph with Graph Convolutional Networks
65. Robust Smart Card Authentication Scheme for Multi-server Architecture
66. Mechanism for Preventing Registration Flooding Attack in SIP
67. Weakly Supervised Image Annotation and Segmentation
68. Empirical Study on Multi Convolutional Layer-based Convolutional Neural Network Classifier for Plant Leaf Disease Detection
69. Clothing invariant human gait recognition using modified local optimal oriented pattern binary descriptor
70. Gaussian Filtered Gait Energy Template and Centroid Corner Distance Features for Human Gait Recognition
71. An Approach to Speed Invariant Gait Analysis for Human Recognition using Mutual Information
72. Frontal Gait Recognition based on Hierarchical Centroid Shape Descriptor and Similarity Measurement
73. An empirical study to estimate the stability of random forest classifier on the hybrid features recommended by filter based feature selection technique
74. Clothing invariant human gait recognition using modified local optimal oriented pattern binary descriptor.
75. Windows malware detection system based on LSVC recommended hybrid features
76. Enhanced mobility routing protocol for wireless sensor network
77. Enhanced mobility aware routing protocol for Low Power and Lossy Networks
78. Secure data migration between cloud storage systems
79. H-LEACH protocol with modified cluster head selection for WSN
80. Image segmentation using encoder-decoder architecture and region consistency activation
81. Hypervisor and virtual machine dependent Intrusion Detection and Prevention System for virtualized cloud environment
82. Comparative study of Principal Component Analysis based Intrusion Detection approach using machine learning algorithms
83. Location prediction algorithm for a nonlinear vehicular movement in VANET using extended Kalman filter
84. Enhanced time-bound ticket-based mutual authetication scheme for cloud computing
85. Secure key exchange scheme for IPTV broadcasting
86. Comparative study of Principal Component Analysis based Intrusion Detection approach using machine learning algorithms
87. Virtual machine introspection based spurious process detection in virtualized cloud computing environment
88. Virtual machine introspection based spurious process detection in virtualized cloud computing environment.
89. A novel smart card mutual authentication scheme for session transfer among registered devices
90. Enhanced mutual authentication scheme for cloud architecture
91. Two Step Mutual Authentication Scheme for SIP
92. Cryptanalysis of SIP secure and efficient authentication scheme
93. Comments on symmetric key encryption based smart card authentication scheme
94. Enhanced Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.