Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More
Number 3 (ISBN: 978-93-80865-68-5)
# | Article Title |
---|---|
1 | A High-Throughput ASIC implementation of Configurable Advanced Encryption Standard (AES) Processor
Authors :P. Saravanan, N. Renuka Devi, G. Swathi, Dr. P. Kalpana |
2 | SSL Enhancement
Authors :Fenil Kavathia, Ajay Modi |
3 | A Unified Approach for Real Time Intrusion Detection using Intelligent Data Mining Techniques
Authors :Naveen N C, Dr. R. Srinivasan, Dr. S. Natarajan |
4 | Dependent Private Key Generation in NTRU Cryptosystems
Authors :Rakesh Nayak, Jayaram Pradhan, C.V. Sastry |
5 | Enhancing Secure File Transfer by Analyzing Repeated Server Based Strategy using Gargantuan Peers (G-peers)
Authors :Kaushik Sekaran |
6 | A LWE-Based Secret Sharing Scheme
Authors :Adela Georgescu |
7 | Detecting Zero-Day Attack Signatures using Honeycomb in a Virtualized Network
Authors :Reshma R. Patel, Chirag S. Thaker, Hemant B. Patel |
8 | On the Authentication of Date in E-mail using Trusted Time Stamping Service
Authors :M. Tariq Banday |