Search


Current filters:
Start a new search
Add filters:

Use filters to refine the search results.


Results 21-30 of 141 (Search time: 0.019 seconds).
Item hits:
PreviewIssue DateTitleAuthor(s)Institute NameLevelCountry
2019Comparative Analysis of Visual Secret Sharing Cryptography Scheme: Shamir's Secret Sharing and Proactive Secret SharingRegmi, BikashCentral Department of Computer Science and Information TechnologyMasters-
Apr-2019A Performance Comparison Between Hypervisors And Lightweight VirtualizationShrestha, SalinaCentral Department of Computer Science and Information TechnologyMasters-
2019Analysis of Frequency Domain Image Steganography Using DCT, DWT and DCT With DWTMaharjan, SajinaCentral Department of Computer Science and Information TechnologyMasters-
2019Comparative Study of Clustering Algorithms for Nepali NewsDahal, Yub RajCentral Department of Computer Science and Information TechnologyMasters-
2019“Comparative Analysis of Double Image Encryption Schemes: Arnold Cat Map-Blowfish and Arnold Cat Map-TEA”Shakya, SampurnaCentral Department of Computer Science and Information TechnologyMasters-
2017Nepal Stock Exchange Market Prediction using Support Vector Regression and Back- Propagation Neural NetworkPun, Top BahadurCentral Department of Computer Science and Information TechnologyMasters-
2007Analytical Evaluation of Round Robin Algorithm to Find the Optimal Quantum SizePandey, Dhiraj KedarCentral Department of Computer Science and Information TechnologyMasters-
2020Comparative Study of CAST and TWOFISH Algorithm using Various Modes of OperationsMaharjan, SabitaCentral Department of Computer Science and Information TechnologyMasters-
2011Analysis of Dedicated Cryptographic Hash Functions–MD5 and SHA-1Gautam, SudhirCentral Department of Computer Science and Information TechnologyMasters-
2013Evaluation of Direct and Indirect Authentication Mechanisms in Mobile NetworksBhatt, Deependra PrasadCentral Department of Computer Science and Information TechnologyMasters-