Skip to main content
Koha online
Your cart is empty.
Cart
Lists
Public lists
WISE
joshi shubhangi
Computer Science
Technical communication
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
SNDT WOMEN'S UNIVERSITY
BMK Knowledge Resource Centre
Vithaldas Vidyavihar, Juhu Tara Road,
Santacruz (West) Mumbai - 400049
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog by keyword
Advanced search
Authority search
Tag cloud
Contact
Log in to your account
Card number or username:
Password:
Home
Advanced search
Results of search for 'su:"Encryption "'
Refine your search
Availability
Limit to records with available items
Authors
A.B.Akbar pasha
A.Manimaran
C.A. Yogaraja
C.Vimala
Dr.T.PURUSHOTHAMAN
G.Selvi
Meichingthuan Pamei
Ramesh Kumar Mandal
S. Joseph
V.M.Chandrasekaran
Show more
Show less
Item types
Journal Article
Your search returned 6 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to cart
Add to list
New list
Place hold
Results
1.
A Substitution Approach to Encrypt Data Obscure in Compressed Video Streams
by
A.B.Akbar pasha
C.Vimala
In:
Indian Journal of Electronic & Tele- Communication Engineering
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
2.
Implementing Query Builder In Encryption With Ordered Bucketization (Eob)
by
Meichingthuan Pamei
Ramesh Kumar Mandal
In:
Indian Journal of Wireless and Mobile Communication
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
3.
Dynamic key cryptography in sharing medicine
by
A.Manimaran
V.M.Chandrasekaran
In:
Journal of Advance Software Engineering
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
4.
Cryptography in IoT Using Elliptic Curve Cryptography with Adaptive Hunter-Prey Optimization
by
C.A. Yogaraja
In:
IETE Journal of Research
New Delhi IETE
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
5.
Secured IoT Data Transmission with Enhanced Integrated Encryption Techniques with Blockchain Technology
by
S. Joseph
In:
IETE Journal of Research
New Delhi IETE
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
6.
Cryptanalysis of data encryption standard cipher system using heuristic search algorithms
by
G.Selvi
Dr.T.PURUSHOTHAMAN
In:
Indian Journal of Modern Wireless & Optical Communication
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
Not finding what you're looking for?
Make a
purchase suggestion