Weighted threshold ECDSA for securing bitcoin wallet PDK Singh ACCENTS Transactions on Information Security, 2017 | 46* | 2017 |
Application of chaos theory in data security-a survey SSSV Sathyanarayana ACCENTS Transactions on Information Security, 2017 | 18* | 2017 |
A comprehensive study on digital signature for internet security P Saha ACCENTS Transactions on Information Security 1 (1), 2016 | 16 | 2016 |
An efficient ID-based partially blind signature scheme and application in electronic-cash payment system MKCP Katti ACCENTS Transactions on Information Security, 2017 | 13* | 2017 |
Arduino based smart home automation AK Majhi, S Dash, CK Barik ACCENTS Transactions on Information Security (TIS) 6 (22), 7-12, 2021 | 10 | 2021 |
Key management infrastructure in cloud computing environment-a survey MNRSV Sathyanarayana ACCENTS Transactions on Information Security, 2017 | 8 | 2017 |
Comparison of LSI algorithms without and with pre-processing: using text document based search KMTN Sheikh Muhammad Saqib ACCENTS Transactions on Information Security, 2016 | 8 | 2016 |
Time domain attribute based encryption for big data access control in cloud environment SKS Nickolas ACCENTS Transactions on Information Security, 2017 | 6 | 2017 |
A survey and analysis on color image encryption algorithms KPSC Rupa Rajoriya ACCENTS Transactions on Information Security, 2018 | 5 | 2018 |
A secure key exchange protocol using link weights and dynamic tree parity machine (TPM) MDHRGKP Ganesan P, Priyanka B.R, Mahfooz Sheikh ACCENTS Transactions on Information Security, 2017 | 5 | 2017 |
Brief comparison of RSA and diffie-hellman (public key) algorithm A Roy Transactions on Information Security 1, 2016 | 5 | 2016 |
An efficient intrusion detection mechanism based on particle swarm optimization and KNN A Vijay, K Patidar, M Yadav, R Kushwah ACCENTS Transactions on Information Security (TIS) 5 (20), 36-41, 2020 | 3 | 2020 |
Extraction of key/title/aspect words from document using wordnet TNKM Sheikh Muhammad Saqib ACCENTS Transactions on Information Security, 2016 | 3 | 2016 |
Object oriented quality prediction through artificial intelligence and machine learning: a survey JK Saha, K Patidar, R Kushwah, G Saxena ACCENTS Transactions on Information Security (TIS) 5 (17), 1-5, 2020 | 2 | 2020 |
Identical chaotic synchronization for hash generation SSVGKP Medini H K, Mahfooz Sheikh, Murthy DHR ACCENTS Transactions on Information Security, 2017 | 2* | 2017 |
A review and analysis based on image encryption techniques RKGKS Ravi Shankar Yadav, Kailash Patidar ACCENTS Transactions on Information Security, 2018 | 1 | 2018 |
An efficient AES and blowfish based video data encryption NSRK Jitendra J. Bonde, Kailash Patidar, Manoj Kumar Yadav ACCENTS Transactions on Information Security, 2018 | 1* | 2018 |
New secure and reliable polygraphic cryptosystem S Paliwal ACCENTS Transactions on Information Security, 2017 | 1 | 2017 |
A survey on IoT security: application areas, security threats, and solution architectures AK Dubey ACCENTS Transactions on Information Security (TIS) 7 (26), 9-16, 2022 | | 2022 |
Cybersecurity data science and threats: an overview from machine learning perspective S Priyadarshi, MA Hashmi ACCENTS Transactions on Information Security (TIS) 7 (25), 1-8, 2022 | | 2022 |