1 | -- | 18 | Monika Mathur, Nidhi Goel. FPGA implementation of AES encryptor based on rolled and masked approach |
19 | -- | 34 | Jing Niu. Design of automatic monitoring system for network information security in cloud computing environment |
35 | -- | 69 | K. Abhimanyu Kumar Patro, Bibhudendra Acharya. An efficient two-level image encryption system using chaotic maps |
70 | -- | 81 | Sunil Gupta, Akansha Bansiya, Mansi Saini, Amuleek Sidhu. Blockchain-based EHR storage and access control system |
82 | -- | 108 | Nureni Ayofe Azeez, Odejinmi Oluwatobi Samuel. A cyberstalking-free global network with artificial intelligence approach |
109 | -- | 134 | K. K. Amith, H. A. Sanjay 0001, Ajay Mahadevan, K. Harshita, D. Eshwar, K. Aditya Shastry. Performance driven Hyperledger Fabric-based blockchain framework for mass e-voting in India |
135 | -- | 161 | Thembekile O. Mayayise. BYOD security issues and controls framework: an outcome of a systematic literature review |
162 | -- | 184 | Akanksha S. Mahajan, Pradnya K. Navale, Vaishnavi V. Patil, Vijay M. Khadse, Parikshit N. Mahalle. The hybrid framework of ensemble technique in machine learning for phishing detection |
185 | -- | 204 | P. L. Chithra, R. Aparna. Blockchain-based image encryption with spiral mapping and hashing techniques in dual level security scheme |
205 | -- | 228 | Jay Dave, Meghna Bhatt, Deep Pancholi. Secure proof of ownership for deduplicated cloud storage system |