Vol 7, No S4 (2014)

Table of Contents

Vol 7, No S4 (2014)

Articles

Security for an Image Using Bit-slice Rotation Method-image Encryption
R. Vijayaraghavan, S. Sathya, N. R. Raajan
DOI:10.17485/ijst/2014/v7iS4/54081 ,  Vol 7, No S4 (2014), Pagination: 1-7
ABSTRACT |  PDF Abstract Views: 232  |  PDF Views: 0
Multi Level Encryption and Decryption Tool for Secure Administrator Login over the Network
Delson Therambath Rajanbabu, Chaithanya Raj
DOI:10.17485/ijst/2014/v7iS4/54082 ,  Vol 7, No S4 (2014), Pagination: 8-14
ABSTRACT |  PDF Abstract Views: 256  |  PDF Views: 0
Countermeasure against Side Channel Power Attacks in Cryptography Devices
K. P. Sridhar, S. Saravanan, R. Vijay Sai
DOI:10.17485/ijst/2014/v7iS4/54083 ,  Vol 7, No S4 (2014), Pagination: 15-20
ABSTRACT |  PDF Abstract Views: 223  |  PDF Views: 0
Energy Efficient Target Coverage in Sensor Networks
D. Priyashree, B. Baranidharan, B. Shanthi
DOI:10.17485/ijst/2014/v7iS4/54084 ,  Vol 7, No S4 (2014), Pagination: 21-23
ABSTRACT |  PDF Abstract Views: 241  |  PDF Views: 0
Image and Video Error Rate Analysis in Full Duplex Communication Using Phase Offset
B. Pon Pragadesh Kumar, N. R. Raajan, S. Karthik
DOI:10.17485/ijst/2014/v7iS4/54085 ,  Vol 7, No S4 (2014), Pagination: 24-27
ABSTRACT |  PDF Abstract Views: 232  |  PDF Views: 0
Optimal Hamming Distance Model for Crypto Cores against Side Channel Threats
K. P. Sridhar, D. Muralidharan
DOI:10.17485/ijst/2014/v7iS4/54086 ,  Vol 7, No S4 (2014), Pagination: 28-33
ABSTRACT |  PDF Abstract Views: 258  |  PDF Views: 0
Pipelined Quadratic Equation Based Novel Multiplication Method for Cryptographic Applications
B. Vignesh
DOI:10.17485/ijst/2014/v7iS4/54087 ,  Vol 7, No S4 (2014), Pagination: 34-39
ABSTRACT |  PDF Abstract Views: 230  |  PDF Views: 0
Spectrum Sensing Using Energy Detection Technique for Cognitive Radio Networks Using PCA Technique
R. Sindhubargavi, M. Yuvasrri Sindhu, R. Saravanan
DOI:10.17485/ijst/2014/v7iS4/54088 ,  Vol 7, No S4 (2014), Pagination: 40-45
ABSTRACT |  PDF Abstract Views: 232  |  PDF Views: 0
Securing the Femtocells: Anonymity and Location Privacy
Marc del Valle, B. Manikandan, V. S. Shankar Sriram
DOI:10.17485/ijst/2014/v7iS4/54089 ,  Vol 7, No S4 (2014), Pagination: 46-51
ABSTRACT |  PDF Abstract Views: 224  |  PDF Views: 0
Flip Flop and Double Substitution Based Textual Encryption
D. Shrivishwanath, N. R. Raajan, L. Gopinath
DOI:10.17485/ijst/2014/v7iS4/54090 ,  Vol 7, No S4 (2014), Pagination: 52-55
ABSTRACT |  PDF Abstract Views: 239  |  PDF Views: 0
Authentication Service in Hadoop Using one Time Pad
Nivethitha Somu, A. Gangaa, V. S. Shankar Sriram
DOI:10.17485/ijst/2014/v7iS4/54091 ,  Vol 7, No S4 (2014), Pagination: 56-62
ABSTRACT |  PDF Abstract Views: 239  |  PDF Views: 0
Partial Reconfigurable Implementation of IEEE802.11g OFDM
S. Sivanantham, R. Adarsh, S. Bhargav, K. Jagannadha Naidu
DOI:10.17485/ijst/2014/v7iS4/54092 ,  Vol 7, No S4 (2014), Pagination: 63-70
ABSTRACT |  PDF Abstract Views: 223  |  PDF Views: 0