Browsing by Author Chandavarkar B.R.

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 17 to 30 of 30 < previous 
Issue DateTitleAuthor(s)Supervisor(s)
2020Link Quality-based Routing Protocol for Underwater Acoustic Sensor NetworksNazareth P.; Chandavarkar B.R.-
2020A Mathematical Model for Node Mobility during Water Current and Tsunami in Underwater Sensor NetworksTejaskumar K.; Dharamdas I.R.; Chandavarkar B.R.-
2020Mitigating Localization and Neighbour Spoofing Attacks in Underwater Sensor NetworksChandavarkar B.R.; Gadagkar A.V.-
2020Mitigating Man-in-the-Middle Attack in Digital SignatureJain S.; Sharma S.; Chandavarkar B.R.-
2021Nonce: Life Cycle, Issues and Challenges in CryptographySharma S.; Jain S.; Chandavarkar B.R.-
2021One Time Password (OTP) Life Cycle and Challenges: Case StudyKumar D.; Gautam U.K.; Chandavarkar B.R.-
2021Prime Numbers and Its Applications in Security: Case StudyNamdeo A.K.; Lomga A.; Chandavarkar B.R.-
2020Remote User Authentication and Issues: A SurveyMehra R.; Meshram A.; Chandavarkar B.R.-
2020Security issues and challenges in Healthcare Automated DevicesJangid A.; Dubey P.K.; Chandavarkar B.R.-
2020Techniques to Secure Address Resolution ProtocolSelvarajan S.; Mohan M.; Chandavarkar B.R.-
2020Undeniable Signature Scheme: A SurveyKale P.; Hazarika P.; Chandavarkar B.R.-
2020Use Cases of Authentication Protocols in the Context of Digital Payment SystemThawre G.; Bahekar N.; Chandavarkar B.R.-
2021Void-aware routing protocols for underwater communication networks: A surveyNazareth P.; Chandavarkar B.R.-
2021Ways of Connecting Illiterates with the Security Mechanism: Case StudyKumar S.R.; Sonkar M.; Chandavarkar B.R.-