Collection's Items (Sorted by Submit Date in Descending order): 1 to 17 of 17
Issue Date | Title | Author(s) |
2015-12-03 | Secure OTP Distribution Scheme for Authentication | Kumuthini, V. |
2015-12-03 | Implementation and Evaluation of an Alternate Method of Confidentiality without Conventional Cryptographic Algorithms | Lokuhetty, D.K. |
2015-12-03 | Data Protection Add-On for Google Docs | Silva, E.H.P. |
2015-12-02 | Real Time SQL Injection Detection Add-on for Mozilla Firefox | Warnakulasooriya, W.M.I.G.B.D. |
2015-07-17 | Open Source Trusted Service Manager for Inter-bank NFC Transactions | Perera, K.D. |
2015-07-17 | Android APK Theft Prevention Using a Cross-Marketplace License Verification Library | Perera, A.H. |
2015-07-08 | Interpret Security Data on Wi-Fi Hotspots through Mobile Application | Nawarathne, A.R. |
2015-07-08 | Automated Patch Management and Vulnerability Assessment Tool | Ranmuthugala, R.A.D.U. |
2015-07-08 | Audio Steganography for Secure Communication | Nisansala, D.D.T. |
2015-07-08 | ANDROPHSY Forensic Framework for Android | Akarawita, I.U. |
2015-07-08 | Open Source Security Model for Web Based Applications | Wijesinghe, H.B.S.J. |
2015-07-07 | Database Security for Billing System | Jayakody, A.U. |
2015-07-07 | Cifrado Cryptographic key based Open Source Data Backup Solution | Suren, W.G.S. |
2015-07-07 | Improving the Accuracy of Security Incidents and Event Monitoring by Optimizing Log Correlation Techniques | Ranasinghe, R.A.K.M. |
2015-07-07 | Secure Architecture for Distributed Micropayment System | Rajapaksha, R.P.D.T. |
2015-07-07 | Processing numerical data securely in NoSQL database backed shared user spaces | Nissanka, L.N.A.S.C. |
2015-07-07 | A secure file sharing system using anonymous networks and public communication channels | Geeganage, R.P. |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 17 of 17