Advanced women security app: We’RSafe
|
47-51
|
Tanusri Dey, Upama Bhattacharjee, Sanjana Mukherjee, Tripti Paul, Rachita Ghoshhajra
|
DOI: 10.18280/rces.040201 |
A Gaussianization-based performance enhancement approach for coded digital PCM/FM
|
52-56
|
Xinglai Wang, Xiaoqian Chen, Yan Wang, Guojiang Xia
|
DOI: 10.18280/rces.040202 |
Symmetric key cryptography using digital circuit based on one right shift
|
57-61
|
Joyita Goswami (Ghosh), Manas Paul
|
DOI: 10.18280/rces.040203 |
Security and privacy issues for cloud computing and its challenges
|
62-66
|
Moumita Sen, Sasmita S. Choudhury
|
DOI: 10.18280/rces.040204 |
Elliptic curve cryptosystem (ECC)
|
67-69
|
Jyotsna K. Mandal, Arindam Sarkar, Avijit Bose, Sharmistha Halder
|
DOI: 10.18280/rces.040205 |
Secured image encryption scheme based on DNA encoding and chaotic map
|
70-75
|
Soumya Paul, Pranjal Dasgupta, Prabir Kr. Naskar, Atal Chaudhuri
|
DOI: 10.18280/rces.040206 |
Cloud computing: its characteristics, security issues and challenges
|
76-81
|
Achla Gupta, Soma Bandyopadhyay, S.S. Thakur
|
DOI: 10.18280/rces.040207 |
Principal component analysis of income sources of urban households in China
|
82-85
|
MingHua Wu, Xiaogang Xia
|
DOI: 10.18280/rces.040208 |