Search

Your search keyword '"Nirmalya Kar"' showing total 36 results

Search Constraints

Start Over You searched for: Author "Nirmalya Kar" Remove constraint Author: "Nirmalya Kar" Database OpenAIRE Remove constraint Database: OpenAIRE
36 results on '"Nirmalya Kar"'

Search Results

6. A metamorphic cryptography approach towards securing medical data using chaotic sequences and Ramanujan conjecture

8. A Novel Approach of Text Encryption Using Random Numbers and Hash Table

10. Improved chaos-based video steganography using DNA alphabets

13. Detecting Malicious Twitter Bots Using Machine Learning

15. An Improved Chaos Based Medical Image Encryption Using DNA Encoding Techniques

16. An Approach Towards Encrypting Paired Digits Using Dynamic Programming and Diffie-Hellman Key Exchange

17. Security and Anonymity Aspects in Tails and Windows 10 Operating Systems

18. A Novel Cryptographic Approach to Implement Confidentiality Using Point Reflection Property

19. Analysing Social Media Responses in Natural Disaster

20. Performance Analysis of Hierarchical and Flat Network Routing Protocols in Wireless Sensor Network Using Ns-2

21. An Improved DNA Based Dual Cover Steganography

22. Chaos-based video steganography

23. An Approach of Extracting Facial Components for Facial Expression Detection using Fiducial Point Detection

24. Voice Recognition and Authentication as a Proficient Biometric Tool and Its Application in Online Exam for P.H People

25. Study of Implementing Automated Attendance System Using Face Recognition Technique

26. Study of NLFSR and Reasonable Security Improvement on Trivium Cipher

27. An Advanced Image Encryption Standard Providing Dual Security: Encryption Using Hill Cipher & RGB Image Steganography

28. ILSB: Indicator-Based LSB Steganography

29. DNA-Based Cryptographic Approach Toward Information Security

30. Secure data communication and cryptography based on DNA based message encoding

31. An approach towards multilevel and multiagent based intrusion detection system

33. An improved data security using DNA sequencing

34. A Pre-processing Algorithm for Faster Convex Hull Computation

35. A Biometric Based Design Pattern for Implementation of a Security Conscious E-Voting System Using Cryptographic Protocols

36. Static and dynamic software metrics complexity analysis in regression testing

Catalog

Books, media, physical & digital resources