Your search returned 8 results.

1.
Trust and Privacy Concerns in Mobile Crowd Sourcing Shailja Joshi

by Joshi, Shailja | Saini, Hemraj.

Material type: Text Text Publication details: Solan, H.P. Jaypee University of Information Technology, Solan 2018Availability: Items available for reference: Not for loanCall number: 005 JOS (1). :

2.
Energy Efficient Virtual Machine Consolidation for Cloud Environment by Oshin Sharma

by Sharma, Oshin | Saini, Hemraj.

Material type: Text Text Publication details: Solan, H.P. Jaypee University of Information Technology, Solan 2018Online access: Click here to access online Availability: Items available for reference: Not for loanCall number: SHA (1). :

3.
On Security and Performance in ECC Noncommutative Cryptography and Signcryption by Gautam Kumar

by Kumar, Gautam | Saini, Hemraj.

Material type: Text Text Publication details: Solan, H.P. Jaypee University of Information Technology, Solan 2017Online access: Click here to access online Availability: Items available for reference: Not for loanCall number: KUM (1). :

4.
On Reduced Cost and Attack Proof Secure Authentication for Multi-Operator Domain of WMN using the Asymmetric Cryptographic Technique Ninni Singh

by Singh, Ninni | Saini, Hemraj.

Material type: Text Text Publication details: Solan [H P] Jaypee University of Information Technology 2015Online access: Click here to access online Availability: Items available for reference: Not for loanCall number: SPR 005 SIN (1). :

5.
Optimization of Symmetric Key Management in Wireless Mesh Networks Aashish Rao

by Rao, Aashish | Saini, Hemraj.

Material type: Text Text Publication details: Solan [H P] Jaypee University of Information Technology 2015Online access: Click here to access online Availability: Items available for reference: Not for loanCall number: SPR 005 RAO (1). :

6.
On Security and Performance Enhancement in Wireless MESH Networks by Geetanjali

by Geetanjali | Saini, Hemraj.

Material type: Text Text Publication details: Solan, H.P. Jaypee University of Information Technology, Solan 2017Online access: Click here to access online Availability: Items available for reference: Not for loanCall number: GEE (1). :

7.
Detection of Jamming Attack in WIMAX Based Communication Systems Tanu Bhardwaj

by Bhardwaj, Tanu | Saini, Hemraj.

Material type: Text Text Publication details: Solan Jaypee University of Information Technology 2014Online access: Click here to access online Availability: Items available for reference: Not for loanCall number: SPR 005 BHA (1). :

8.
Intensification of Software Security using Secure Obfuscation with Injecting and Detecting Code Clones by Pratiksha Gautam

by Gautam, Pratiksha | Saini, Hemraj [Guided by].

Material type: Text Text Publication details: Solan; H.P. Jaypee University of Information Technology 2019Online access: Click here to access online Availability: Items available for reference: Not For LoanCall number: 005 GAU (1). :


Library Home | Contact Us | LRC Help

Copyright @ 2020 LRC
Jaypee University of Information Technology
website hit counter

Powered by Koha