Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
RCES
Archive
Archive
2024: Vol. 11
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2023: Vol. 10
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2022: Vol. 9
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2021: Vol. 8
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2020: Vol. 7
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2019: Vol. 6
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2018: Vol. 5
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2017: Vol. 4
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2016: Vol. 3
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2015: Vol. 2
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2014: Vol. 1
No. 2, December
No. 1, September
Advanced women security app: We’RSafe
Tanusri Dey, Upama Bhattacharjee, Sanjana Mukherjee, Tripti Paul, Rachita Ghoshhajra
10.18280/rces.040201
Page
47-51
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Gaussianization-based performance enhancement approach for coded digital PCM/FM
Xinglai Wang, Xiaoqian Chen, Yan Wang, Guojiang Xia
10.18280/rces.040202
Page
52-56
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Symmetric key cryptography using digital circuit based on one right shift
Joyita Goswami (Ghosh), Manas Paul
10.18280/rces.040203
Page
57-61
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Security and privacy issues for cloud computing and its challenges
Moumita Sen, Sasmita S. Choudhury
10.18280/rces.040204
Page
62-66
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Elliptic curve cryptosystem (ECC)
Jyotsna K. Mandal, Arindam Sarkar, Avijit Bose, Sharmistha Halder
10.18280/rces.040205
Page
67-69
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Secured image encryption scheme based on DNA encoding and chaotic map
Soumya Paul, Pranjal Dasgupta, Prabir Kr. Naskar, Atal Chaudhuri
10.18280/rces.040206
Page
70-75
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Cloud computing: its characteristics, security issues and challenges
Achla Gupta, Soma Bandyopadhyay, S.S. Thakur
10.18280/rces.040207
Page
76-81
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Principal component analysis of income sources of urban households in China
Minghua Wu, Xiaogang Xia
10.18280/rces.040208
Page
82-85
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS