Vol 4, No 2, June 2017

Advanced women security app: We’RSafe

47-51

Tanusri Dey, Upama Bhattacharjee, Sanjana Mukherjee, Tripti Paul, Rachita Ghoshhajra

DOI: 10.18280/rces.040201

A Gaussianization-based performance enhancement approach for coded digital PCM/FM

52-56

Xinglai Wang, Xiaoqian Chen, Yan Wang, Guojiang Xia

DOI: 10.18280/rces.040202

Symmetric key cryptography using digital circuit based on one right shift

57-61

Joyita Goswami (Ghosh), Manas Paul

DOI: 10.18280/rces.040203

Security and privacy issues for cloud computing and its challenges

62-66

Moumita Sen, Sasmita S. Choudhury

DOI: 10.18280/rces.040204

Elliptic curve cryptosystem (ECC)

67-69

Jyotsna K. Mandal, Arindam Sarkar, Avijit Bose, Sharmistha Halder

DOI: 10.18280/rces.040205

Secured image encryption scheme based on DNA encoding and chaotic map

70-75

Soumya Paul, Pranjal Dasgupta, Prabir Kr. Naskar, Atal Chaudhuri

DOI: 10.18280/rces.040206

Cloud computing: its characteristics, security issues and challenges

76-81

Achla Gupta, Soma Bandyopadhyay, S.S. Thakur

DOI: 10.18280/rces.040207

Principal component analysis of income sources of urban households in China

82-85

MingHua Wu, Xiaogang Xia

DOI: 10.18280/rces.040208