International Journal of Science and Research (IJSR)
Computer Science
Downloads: 121 | Views: 458
Computer Science & Engineering, India, Volume 5 Issue 3, March 2016
Pages: 916 - 920Review on Imbricate Cryptography
Bhangale Snehal Ananda | P. B. Bhalerao
Downloads: 121 | Views: 616
Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1797 - 1801Tool for Converting Source Code to UML Diagrams & Measuring Object Oriented Metrics in OO Java Software
Shubhangi Sakore | Ravina Kudale
Downloads: 121 | Views: 589
Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 174 - 176Collision Informer Using Augmented Reality
Aakash Agrawal | Gourishankar Bawade | Samruddha Shete | Roma Maity
Downloads: 121 | Views: 670
Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 227 - 230A Survey on Delay Constraint Scheduling in Wireless Sensor Network
Pallavi P. Bambal | Deepak C. Mehetre
Downloads: 121 | Views: 561
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 449 - 452Server Virtualization using Cloud Environment for Data Storage & Backup
Mayur S. Agrawal | Nilesh Vani
Downloads: 121 | Views: 553
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 632 - 634Avoidance of Sensitive Data Exposure in Intramail System Using MD5 Algorithm
Jissmol T Antony | Gopal B
Downloads: 121 | Views: 566
Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 428 - 431Message Authentication and Source Privacy in Wireless Networks
Vaishali Kisanrao Gulhane | S. N. Shelke
Downloads: 121 | Views: 431
Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1132 - 1134An Improvement on the Security of Odd-Even-LSB Based Steganography by Adding Encryption
Ayda Alizadeharasi | Maryam Safaei Rizi
Downloads: 121 | Views: 425
Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 862 - 866Improved Security and Avoid Clone Attack in Wireless Sensor Network
Kulwinder Singh | Sheenam Malhotra
Downloads: 121 | Views: 558
Computer Science & Engineering, India, Volume 5 Issue 9, September 2016
Pages: 668 - 673Secure Secret Information Transmission with Audio-Video Steganography Using Encryption and Data Authentication
Mandeep Singh | Garima Mahajan