263 | -- | 276 | Shipra Kumari, Hrishikesh Mahato. Construction of weighted orthogonal matrices over finite field and its application in cryptography |
277 | -- | 297 | Samson Ebenezar Uthirapathy, Domnic Sandanam. Sentiment analysis in social network data using multilayer perceptron neural network with hill-climbing meta-heuristic optimisation |
298 | -- | 322 | Ankush Balaram Pawar, Shashikant U. Ghumbre, Rashmi M. Jogdand. Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud |
323 | -- | 353 | Abiy Tadesse Abebe, Yalemzewd Negash Shiferaw, P. G. V. Suresh Kumar. Lightweight integrated cryptosystem based on reconfigurable hardware for IoT security |
354 | -- | 376 | S. Jayashree, S. V. N. Santhosh Kumar. A comprehensive survey on effective key management schemes for secured authentication in vehicular ad hoc network |
377 | -- | 389 | Santosh Kumar Ravva, R. M. Krishna Sureddi. Cryptanalysis of common prime RSA with two decryption exponents: Jochemsz and May approach |
390 | -- | 410 | Zhenquan Ding, Hui Xu, Lei Cui 0003, Haiqiang Fei, Yongji Liu, Zhiyu Hao. HEMC: a dynamic behaviour analysis system for malware based on hardware virtualisation |
411 | -- | 435 | Umesh Kumar, Vadlamudi Ch. Venkaiah. A novel stream cipher based on quasigroups and QG-PRNG |
436 | -- | 452 | Ruchi Agarwal, Manoj Kumar. A privacy preserving scheme for encrypted medical images using RDH |
453 | -- | 474 | Mohammed Almehdhar, Mohammed M. Abdelsamea, Na Ruan. Deep multi-locality convolutional neural network for DDoS detection in smart home IoT |