International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Computer Science: Page 182: International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)

Computer Science

Downloads: 121 | Views: 458

Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 916 - 920

Review on Imbricate Cryptography

Bhangale Snehal Ananda | P. B. Bhalerao

Downloads: 121 | Views: 616

Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1797 - 1801

Tool for Converting Source Code to UML Diagrams & Measuring Object Oriented Metrics in OO Java Software

Shubhangi Sakore | Ravina Kudale

Downloads: 121 | Views: 589

Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 174 - 176

Collision Informer Using Augmented Reality

Aakash Agrawal | Gourishankar Bawade | Samruddha Shete | Roma Maity

Downloads: 121 | Views: 670

Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 227 - 230

A Survey on Delay Constraint Scheduling in Wireless Sensor Network

Pallavi P. Bambal | Deepak C. Mehetre

Downloads: 121 | Views: 561

Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 449 - 452

Server Virtualization using Cloud Environment for Data Storage & Backup

Mayur S. Agrawal | Nilesh Vani

Downloads: 121 | Views: 553

Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 632 - 634

Avoidance of Sensitive Data Exposure in Intramail System Using MD5 Algorithm

Jissmol T Antony | Gopal B

Downloads: 121 | Views: 566

Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 428 - 431

Message Authentication and Source Privacy in Wireless Networks

Vaishali Kisanrao Gulhane | S. N. Shelke

Downloads: 121 | Views: 431

Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1132 - 1134

An Improvement on the Security of Odd-Even-LSB Based Steganography by Adding Encryption

Ayda Alizadeharasi | Maryam Safaei Rizi

Downloads: 121 | Views: 425

Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 862 - 866

Improved Security and Avoid Clone Attack in Wireless Sensor Network

Kulwinder Singh | Sheenam Malhotra

Downloads: 121 | Views: 558

Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 668 - 673

Secure Secret Information Transmission with Audio-Video Steganography Using Encryption and Data Authentication

Mandeep Singh | Garima Mahajan

Top