113 results on '"Arun Mishra"'
Search Results
2. LWE based quantum-resistant pseudo-random number generator.
3. Efficient implementation of post quantum MLWR-based PKE scheme using NTT.
4. Non Deterministic Pseudorandom Generator for Quantum Key Distribution.
5. Hardening web browser security configuration using machine learning technique.
6. LWR-based Quantum-Safe Pseudo-Random Number Generator.
7. Uncertainty and Consistency Assessment in Multiple Microplastic Observation Datasets in the Baltic Sea
8. Spatiotemporal Variability of Microplastics in the Eastern Baltic Sea
9. Design of Language Translator Headphone: The Future of Sustainable Communication
10. Are doctors feeling burnout? – Multicenter cross-sectional study on burnout syndrome and its determinants during the ongoing pandemic
11. Estimating Microplastics related to Laundry Wash and Personal Care Products released to Wastewater in Major Estonian Cities: a comparison of calculated and measured microplastics
12. Information Processing and Security Analysis of Shared System Resource Based Architectures.
13. HYPOVITAMINOSIS D EXACERBATES TYPE 2 DIABETIC COMORBIDITIES
14. Authentication of Electronic Control Unit using Arbiter Physical Unclonable Functions in Modern Automobiles.
15. Dynamic Monitoring of Website Content and Alerting Defacement Using Trusted Platform Module
16. Framework to Secure Browser Using Configuration Analysis.
17. Relation between cybernetics and information security: from Norbert Wiener's perspectives.
18. Quantitative analysis of information leakage in service-oriented architecture-based Web services.
19. Relating Wiener's cybernetics aspects and a situation awareness model implementation for information security risk management.
20. Audit and Analysis of Impostors: An experimental approach to detect fake profile in online social network.
21. Association between high-sensitivity C-reactive protein and lipid profile in patients with type 2 diabetes mellitus
22. Modeling the transport and accumulation of microplastics in the Gulf of Finland
23. An FPGA Based Ecosystem for USBPHY Validation.
24. Authentication of Trusted Platform Module Using Processor Response.
25. Cyber Security Enhancement with an Intelligent Android Prototype
26. Efficient Pseudo-Random Number Generator Using Number-Theoretic Transform
27. Securing the Root Through SELinux.
28. Monitoring Information Leakage in a Web Browser.
29. Security Intensification in Restricted Area By Confining Unauthorized Smart Phone Applications
30. Compact Public-Key Encryption Using Learning with Rounding
31. Context-Aware System Using .NET Approach.
32. Evaluation of Cryptographically Secure Pseudo Random Number Generators for Post Quantum Era
33. Safety and Efficacy of Paracetamol + Lignocaine Injection in Patients with High-grade Fever:A Prospective Analysis
34. Dynamic adaptability with .NET service components.
35. Component assessment and proactive model for support of dynamic integration in self adaptive system.
36. Hypovitaminosis D causes suboptimal glycemic control in type 2 diabetic patients
37. Drug lag and key regulatory barriers in the emerging markets
38. Enhanced A5 Algorithm for Secure Audio Encryption
39. Prediction Techniques for Maintenance of Marine Bilge Pumps Onboard Ships
40. Survey of Various Techniques for Voice Encryption
41. CRITICAL APPRAISAL ON SIGNIFICANCE OF PRACTICAL TRAINING IN SUSHRUT SAMHITA W.S.R. TO YOGYA SOOTRIYAM - A LITERARY REVIEW
42. Analysis of Crystals-Dilithium for BlockChain Security
43. Secure Web Browsing Using Trusted Platform Module (TPM)
44. CORRELATION BETWEEN OXIDATIVE STRESS AND ANTIOXIDANT IN DIABETIC NEPHROPATHY
45. A COMPARATIVE STUDY OF MDA LEVEL AS A MARKER OF OXIDATIVE STRESS IN HYPERTENSIVE PATIENTS AND CONTROLS
46. Hand Vein Biometric Recognition Using Local Binary Pattern
47. A study of biochemical inflammatory marker of TNF-alpha in hypothyroidism patients
48. Theoretical framework of quantitative analysis based information leakage warning system
49. Relating Wiener’s cybernetics aspects and a situation awareness model implementation for information security risk management
50. Thread scheduling using ant colony optimization: An intelligent scheduling approach towards minimal information leakage
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.