141 | ||
Researcher: | Rehman, Shabana | |
Guide: | Mustafa, Khurram | |
University: | Jamia Millia Islamia | |
Language: | English | |
142 | Cloud computing data security in the virtual environment with knowledge discovery | |
Researcher: | Khan, Javed Akhtar | |
Guide: | Aloney, M.R. | |
University: | Bhagwant University | |
Language: | English | |
Shodhganga | ||
143 | Gender based violence among the tea garden workers: a study of Darjeeling and Jalpaiguri districts | |
Researcher: | Roy, Sayantani | |
Guide: | Paswan, Nawal, K | |
University: | Sikkim University | |
Language: | Arabic | |
144 | ||
Researcher: | Ao, Rongsentemjen | |
Guide: | D.C., Kalita | |
University: | North-Eastern Hill University, Shillong | |
Language: | English | |
145 | ||
Researcher: | Gill, Mr. Ishpal Singh | |
Guide: | Chandrika , Prof. K. G. | |
University: | Osmania University, Hyderabad | |
Language: | English | |
146 | Land tenure security and livelihood activity choices in tribal areas of Jharkhand | |
Researcher: | Sinha, Ashish Aman | |
Guide: | Behura, A.K.Behera, Hari Charan | |
University: | Indian School of Mines, Dhanbad | |
Language: | English | |
147 | Design and analysis of Bio-inspired secure techniques for self organizing networks | |
Researcher: | Lyngdoh, Juniorika | |
Guide: | Kalita, Hemanta KumarHussain, Md.I. | |
University: | North-Eastern Hill University, Shillong | |
Language: | English | |
148 | Security approaches for portable devices through Encryption-Decryption for health domain | |
Researcher: | Rao P, Naga Malleswara | |
Guide: | V. Vemula, Jaya Rama Krishnaiah | |
University: | Acharya Nagarjuna University, Guntur | |
Language: | English | |
149 | Security concern by designing and developing algorithm for steganography | |
Researcher: | Kaushikbhai, Shah Viral | |
Guide: | Kumbharana, C.K. | |
University: | Saurashtra University, Rajkot | |
Language: | English | |
150 | ||
Researcher: | Suthar, Krunalkumar Bhanubhai | |
Guide: | Pandya, H. N. | |
University: | Saurashtra University, Rajkot | |
Language: | English | |
151 | ||
Researcher: | Singh, Jaimandeep | |
Guide: | Chaudhary, Naveen Kumar | |
University: | National Forensic Sciences University | |
Language: | English | |
152 | Depository system in India:a case study of national securities depository limited nsdl | |
Researcher: | Kumar, Sharad | |
Guide: | Agarwal, A K | |
University: | Mahatma Jyotiba Phule Rohilkhand University | |
Language: | English | |
153 | India`s maritime security:the role of co-ordinated employment of air power | |
Researcher: | Sandhu, Parmjit Singh | |
Guide: | Singh, Umaro | |
University: | Punjabi University | |
Language: | English | |
154 | study of nuclear development and its implications for national security | |
Researcher: | Chauhan, S B S | |
Guide: | Niranjan, G S | |
University: | University of Bundelkhand | |
Language: | English | |
155 | ||
Researcher: | Vishnu Murty, K | |
Guide: | Koteswara Rao, P | |
University: | Sri Venkateswara University | |
Language: | English | |
156 | Secure Image Based Multi-Factor Authentication (SIMFA): a novel approach for web based services | |
Researcher: | Misbahuddin, Mohammed | |
Guide: | Premchand, P | |
University: | Jawaharlal Nehru Technological University | |
Language: | English | |
Shodhganga | ||
157 | Investigations on biometric based information security systems | |
Researcher: | Saini, Nirmala | |
Guide: | Sinha, Aloka | |
University: | Indian Institute of Technology, Delhi | |
Language: | English | |
158 | ||
Researcher: | Anand, Runa | |
Guide: | Sarkar, Bhaswati | |
University: | Jawaharlal Nehru University, New Delhi | |
Language: | English | |
159 | ||
Researcher: | Subba, Bitu | |
Guide: | Paswan, Naval, K | |
University: | Sikkim University | |
Language: | Arabic | |
160 | ||
Researcher: | I, Vijaya | |
Guide: | Rath, Amiya KumarB, Puthal | |
University: | Siksha O Anusandhan University | |
Language: | English |