211 | -- | 228 | Unnikrishnan K, Pramod K. V. Prediction-based robust blind reversible watermarking for relational databases |
229 | -- | 241 | Nanyuan Cao, Zhenfu Cao, Xiaolei Dong, Haijiang Wang. Improved RSA lossy trapdoor function and applications |
242 | -- | 262 | Zhijie Fan, Chengxiang Tan, Xin Li. A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps |
263 | -- | 280 | Umer Waqas, Shazia Afzal, Mubeen Akhtar Mir, Muhammad Yousaf. Cryptographic strength evaluation of AES s-box variants |
281 | -- | 299 | Amardeep Singh, Monika Singh, Divya Bansal, Sanjeev Sofat. Optimised K-anonymisation technique to deal with mutual friends and degree attacks |
300 | -- | 317 | Jayashree D. Gavade, S. R. Chougule, Vishwaja Rathod. A robust passive blind copy-move image forgery detection |
318 | -- | 326 | Mamata Rath, Binod Kumar Pattanayak. Performance evaluation of optimised protocol in MANET |
327 | -- | 343 | Fadi Abu-Amara, Ameur Bensefia. A handwriting document encryption scheme based on segmentation and chaotic logarithmic map |
344 | -- | 353 | Maitreyi Ponguwala, Meda Sreenivasa Rao. Secured spray and focus protocol design in intermittently connected mobile networks |
354 | -- | 379 | Iqra Saraf, Avinash K. Shrivastava, Javaid Iqbal. Effort-based fault detection and correction modelling for multi release of software |
380 | -- | 402 | Ajeet Singh, Appala Naidu Tentu, V. Ch. Venkaiah. A dynamic key management paradigm for secure wireless ad hoc network communications |
403 | -- | 439 | Sunil K. Moon, Rajshree D. Raut. Anti-forensic reversible multi frame block to block pixel mapping information concealing approach to increase the robustness and perceptibility |