S.No |
Paper ID |
Paper Title & Author |
Download PDF |
1 |
AESTR186314 |
The Role of interweave shifting to handle enhanced hill cipher decryption Author- Sushil Kumar singh, Anurag Chandana, Ankur Goel, Anubhav Sharma |
1-5 |
2 |
AESTR186317 |
Smart dumpster using IOT Author- Ishita Sharma, Thandeeswaran R |
6-10 |
3 |
AESTR186320 |
Security Enhancement using a DNA modified polygraphic substitution cipher Author- Anubhav Sharma, Anurag Chandana, Ankur Goel, Sushil Kumar singh |
11-15 |
4 |
AESTR186321 |
Firewall : Natting Configuration
Author- Anwar Nahid, Amit Kishor |
16-19 |
5 |
AESTR186322 |
Page Ranking Algorithm based on link visit
Author- Arif Ali , Sapana Singh |
19-24 |
6 |
AESTR186323 |
Firewall Redistribution Configuration protocol
Author- Anwar Nahid, Amit Kishor |
25-28 |
7 |
AESTR186326 |
Study and implementation of Dijkstra's algorithm in angiography process to analysis veins blockage in Human's Heart. Author- Albia Maqbool1, Dr. Manoj Kumar2
|
29-37 |