Follow
TIS
TIS
Journal
Verified email at theaccents.org - Homepage
Title
Cited by
Cited by
Year
Weighted threshold ECDSA for securing bitcoin wallet
PDK Singh
ACCENTS Transactions on Information Security, 2017
46*2017
Application of chaos theory in data security-a survey
SSSV Sathyanarayana
ACCENTS Transactions on Information Security, 2017
18*2017
A comprehensive study on digital signature for internet security
P Saha
ACCENTS Transactions on Information Security 1 (1), 2016
162016
An efficient ID-based partially blind signature scheme and application in electronic-cash payment system
MKCP Katti
ACCENTS Transactions on Information Security, 2017
13*2017
Arduino based smart home automation
AK Majhi, S Dash, CK Barik
ACCENTS Transactions on Information Security (TIS) 6 (22), 7-12, 2021
102021
Key management infrastructure in cloud computing environment-a survey
MNRSV Sathyanarayana
ACCENTS Transactions on Information Security, 2017
82017
Comparison of LSI algorithms without and with pre-processing: using text document based search
KMTN Sheikh Muhammad Saqib
ACCENTS Transactions on Information Security, 2016
82016
Time domain attribute based encryption for big data access control in cloud environment
SKS Nickolas
ACCENTS Transactions on Information Security, 2017
62017
A survey and analysis on color image encryption algorithms
KPSC Rupa Rajoriya
ACCENTS Transactions on Information Security, 2018
52018
A secure key exchange protocol using link weights and dynamic tree parity machine (TPM)
MDHRGKP Ganesan P, Priyanka B.R, Mahfooz Sheikh
ACCENTS Transactions on Information Security, 2017
52017
Brief comparison of RSA and diffie-hellman (public key) algorithm
A Roy
Transactions on Information Security 1, 2016
52016
An efficient intrusion detection mechanism based on particle swarm optimization and KNN
A Vijay, K Patidar, M Yadav, R Kushwah
ACCENTS Transactions on Information Security (TIS) 5 (20), 36-41, 2020
32020
Extraction of key/title/aspect words from document using wordnet
TNKM Sheikh Muhammad Saqib
ACCENTS Transactions on Information Security, 2016
32016
Object oriented quality prediction through artificial intelligence and machine learning: a survey
JK Saha, K Patidar, R Kushwah, G Saxena
ACCENTS Transactions on Information Security (TIS) 5 (17), 1-5, 2020
22020
Identical chaotic synchronization for hash generation
SSVGKP Medini H K, Mahfooz Sheikh, Murthy DHR
ACCENTS Transactions on Information Security, 2017
2*2017
A review and analysis based on image encryption techniques
RKGKS Ravi Shankar Yadav, Kailash Patidar
ACCENTS Transactions on Information Security, 2018
12018
An efficient AES and blowfish based video data encryption
NSRK Jitendra J. Bonde, Kailash Patidar, Manoj Kumar Yadav
ACCENTS Transactions on Information Security, 2018
1*2018
New secure and reliable polygraphic cryptosystem
S Paliwal
ACCENTS Transactions on Information Security, 2017
12017
A survey on IoT security: application areas, security threats, and solution architectures
AK Dubey
ACCENTS Transactions on Information Security (TIS) 7 (26), 9-16, 2022
2022
Cybersecurity data science and threats: an overview from machine learning perspective
S Priyadarshi, MA Hashmi
ACCENTS Transactions on Information Security (TIS) 7 (25), 1-8, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20