PRIVACY-PRESERVING TECHNIQUES IN BIG DATA AND INFORMATION SECURITY S. Murugesan1, S. Ashok Kumar2, K. Tamilselvi3, T. Thiyagarajan4
|
HARDWARE SECURITY MODEL WITH VEDIC MULTIPLIER BASED ECC ALGORITHM ON HIGH-PERFORMANCE FPGA DEVICESaurabh Singh, Sunita Soni
|
FPGA IMPLEMENTATION OF REAL-TIME SIGNAL PROCESSING ALGORITHMS FOR WIRELESS COMMUNICATION SYSTEMSRakesh Kumar1, Sandeep Kumar Bhakhar2, V. Venkata Ramana3, K. Venkata Ramana4
|
NODE BASED CLONE ATTACK DETECTION IN STATIC WIRELESS SENSOR NETWORKSJ Anthoniraj
|
GATE ENGINEERING OF DOUBLE GATE In0.53Ga0.47As TUNNEL FETC. S. Praveen, Ajith Ravindran, Shajimon K John, Susan Abe
|
DIRECTIONAL ANTENNA BASED EFFICIENT LOCATION AWARE ROUTING IN MOBILE ADHOC NETWORKG Jayasree, K P Indulekha, B Malarkodi
|