• Home
  • Archives
Register Login
    Flag icon
  1. Home
  2. Archives
  3. Volume 184
  4. Issue 3
This website uses cookies

We use cookies to personalize your content and to analyze our traffic. We do not share information about your use of our site with any of our partners including Google Scholar, Web of Science and affiliated journals.

By continuing to use our website, you consent to our use of cookies.

Issue 3 of Volume 184

A Hash Algorithm based Approach for Verifiability and Detection of EVM Tampering

Authors: Bhople Yogesh Jagannath

Key Management for Wireless Sensor Network Security

Authors: Gaith A. Muslim, Ra'ad A. Muhajjar

A Bioparticle Separator based on Dielectrophoretic Integrated with Acoustic Force: Design and Simulation

Authors: Alireza Dehghani, Alireza Kashaniniya

Detecting and Predicting Malicious Nodes in Mobile Ad-hoc Networks using a Secure Technique

Authors: Imran Khan, Pratik Gite

A Proposed Multilayered Framework for Security and Privacy in Big Data

Authors: Danish Bilal Ansari, Muhammad Abdul Khaliq

Generating Custom Datasets with Multi Generative Adversarial Networks

Authors: Donghee Lee, Byeongwoo Kim

Texture based Palm Print Recognition using Discrete Wavelet Transformation

Authors: Dhulipalla Nagajyothi, K. Venkata Ramaiah

Digital Data Retrieval on Web-based Twitter Services using National Institute of Standard and Technology Method

Authors: Iraunasya Wiyanto, Imam Riadi

Journal platform powered by
PhDFocus®
A to Z of Journal Management
API powered by
Web of Science™
PhDFocus® is compliant with United States Education Policy. A part of Foundation of Computer Science. © PhDFocus 2009 - 2025
About PhDFocus®
  • Contact Us
  • FAQ
  • Documentation
  • Privacy
  • Terms
  • Return & Refund