Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by D. Jegalakshmi Princy
Secure Virtualisation Using Hash Key Authentication
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
Related publications
A Secure Perceptual Hash Algorithm for Image Content Authentication
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination
Journal of Information Security and Cybercrimes Research
Quantum-Secure Authentication of a Physical Unclonable Key
Optica
Optics
Molecular Physics,
Optical
Atomic
Magnetic Materials
Electronic
CCA-Secure Public Key Encryption Without Group-Dependent Hash Functions
IEICE Transactions on Information and Systems
Electronic Engineering
Pattern Recognition
Hardware
Computer Vision
Electrical
Architecture
Artificial Intelligence
Software
Secure Authentication System Using Video Surveillance
IOSR Journal of Computer Engineering
Secure Barcode Authentication Using Genetic Algorithm
IOSR Journal of Computer Engineering
Secure In-Vehicle Systems Using Authentication
International Journal of Networked and Distributed Computing
Computer Networks
Computer Science Applications
Communications
Secure Hash Authentication and Cryptography Based Geographical Routing (SHAC-GR) for Wireless Sensor Networks
International Journal of Recent Technology and Engineering
Engineering
Management of Technology
Innovation
Secure Pre-Shared Key (PSK) Authentication for the Internet Key Exchange Protocol (IKE)