| 2013 | 3-Tier Heterogeneous Network Model for Increasing Lifetime in Three Dimensional WSNs. Samayveer Singh, Satish Chand, Bijendra Kumar |
| 2013 | 6H-SiC Based Power VJFET and Its Temperature Dependence. Amir Khan, Mohd. Hasan, Anwar Sadat, Shamsuz Z. Usmani |
| 2013 | A Certificateless Authenticated Key Agreement Protocol for Digital Rights Management System. Dheerendra Mishra, Sourav Mukhopadhyay |
| 2013 | A Comparative Analysis of Various Deployment Based DDoS Defense Schemes. Karanbir Singh, Navdeep Kaur, Deepa Nehra |
| 2013 | A Comparative Study of Reactive Routing Protocols for Industrial Wireless Sensor Networks. Manish Kumar, Itika Gupta, Sudarshan Tiwari, Rajeev Tripathi |
| 2013 | A Framework of Service Selection and Composition for Flexible Network Architecture. Akhilendra Pratap Singh, O. P. Vyas, Shirshu Varma |
| 2013 | A Generalized Model for Internet-Based Access Control Systems with Delegation Support. Utharn Buranasaksee, Kriengkrai Porkaew, Umaporn Supasitthimethee |
| 2013 | A Novel Framework for Users' Accountability on Online Social Networks. Gambhir Mohit, M. N. Doja, Moinuddin |
| 2013 | A Privacy Preserving Representation for Web Service Communicators' in the Cloud. D. Chandramohan, T. Vengattaraman, D. Rajaguru, Ramachandran Baskaran, P. Dhavachelvan |
| 2013 | A Proposal for SMS Security Using NTRU Cryptosystem. Ashok Kumar Nanda, Lalit Kumar Awasthi |
| 2013 | A Review on Remote User Authentication Schemes Using Smart Cards. Keerti Srivastava, Amit K. Awasthi, R. C. Mittal |
| 2013 | A Review on Wireless Network Security. Sandeep Sharma, Rajesh Mishra, Karan Singh |
| 2013 | A Stable Energy-Efficient Location Based Clustering Scheme for Ad Hoc Networks. Anubhuti Roda Mohindra, Charu Kumar |
| 2013 | An Application of Defeasible Logic Programming for Firewall Verification and Reconfiguration. Pritom Rajkhowa, Shyamanta M. Hazarika, Guillermo Ricardo Simari |
| 2013 | An Efficient and Secure Micro-payment Transaction Using Shell Cryptography. Mayank Tiwari, Rajeshwar Kumar, Shaivya Jindal, Pankaj Sharma, Priyanshu |
| 2013 | An Improved Method for Contrast Enhancement of Real World Hyperspectral Images. Shyam Lal, Rahul Kumar, Mahesh Chandra |
| 2013 | Analysis and Improvement of an Authentication Scheme Using Smart Cards. Sonam Devgan Kaul, Amit K. Awasthi |
| 2013 | Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection System. Sanjiban Sekhar Roy, V. Madhu Viswanatham, P. Venkata Krishna, N. Saraf, Anant Gupta, Rajesh Mishra |
| 2013 | Carrier Aggregation for Enhancement of Bandwidth in 4G Systems. Jolly Parikh, Anuradha Basu |
| 2013 | Change Detection from Satellite Images Using PNN. Akansha Mehrotra, Krishna Kant Singh, Kirat Pal, M. J. Nigam |
| 2013 | Ciphertext-Policy Attribute-Based Encryption with User Revocation Support. A. Balu, Kuppusamy Krishnamoorthy |
| 2013 | Classification of Speech Dysfluencies Using Speech Parameterization Techniques and Multiclass SVM. P. Mahesha, D. S. Vinod |
| 2013 | Clusterhead Selection Using Multiple Attribute Decision Making (MADM) Approach in Wireless Sensor Networks. Puneet Azad, Vidushi Sharma |
| 2013 | Comparative Analysis of Contention Based Medium Access Control Protocols for Wireless Sensor Networks. Chandan Kumar Sonkar, Om Prakash Sangwan, Arun Mani Tripathi |
| 2013 | DRMWSN-Detecting Replica Nodes Using Multiple Identities in Wireless Sensor Network. Nagaraj Ambika, G. T. Raju |
| 2013 | DSG-PC: Dynamic Social Grouping Based Routing for Non-uniform Buffer Capacities in DTN Supported with Periodic Carriers. Rahul Johari, Neelima Gupta, Sandhya Aneja |
| 2013 | Deployment of Sensors in Regular Terrain in Form of Interconnected WSN Units. Arup Kr. Chattopadhyay, Chandan Kumar Bhattacharyya |
| 2013 | Design and Analysis of Small Planar Antenna Based on CRLH Metamaterial for WSN Application. Sanjeev Jain, Indrasen Singh, Vijay Shanker Tripathi, Sudarshan Tiwari |
| 2013 | Design of High Performance MIPS Cryptography Processor. Kirat Pal Singh, Shivani Parmar, Dilip Kumar |
| 2013 | Design of Low Power FSM Using Verilog in VLSI. Himani Mittal, Dinesh Chandra, Arvind Tiwari |
| 2013 | Design of an Edge Detection Based Image Steganography with High Embedding Capacity. Arup Kumar Pal, Tarok Pramanik |
| 2013 | Detailed Dominant Approach Cloud Computing Integration with WSN. Niranjan Lal, Shamimul Qamar, Mayank Singh |
| 2013 | Detailed Dominant Approach Cloud Computing Integration with WSN. Niranjan Lal, Shamimul Qamar, Mayank Singh |
| 2013 | Enhanced Block Playfair Cipher. Arvind Kumar, Pawan Singh Mehra, Gagan Gupta, Manika Sharma |
| 2013 | Evaluation of Understandability of Object-Oriented Design. Devpriya Soni |
| 2013 | Extended Ant Colony Optimization Algorithm (EACO) for Efficient Design of Networks and Improved Reliability. Mohd Ashraf, Rajesh Mishra |
| 2013 | FLAME: A Flexible and Low-Power Architecture for Wireless Mesh Networks. Seyed Dawood Sajjadi Torshizi, Sadra Mohammadalian, Fazirulhisyam Hashim, Subramaniam Shamala |
| 2013 | Fault Tolerant Range Grouping Routing in Dynamic Networks. Akanksha Bhardwaj, Prachi Badera, K. Rajalakshmi |
| 2013 | Feature and Future of Visual Cryptography Based Schemes. Dhiraj Pandey, Anil Kumar, Yudhvir Singh |
| 2013 | Filtering Nonlinear Feedback Shift Registers Using Welch-Gong Transformations for Securing RFID Applications. Kalikinkar Mandal, Guang Gong |
| 2013 | Formal Modeling of Mobile Middleware for Tuple Space Coordination over Multiple Heterogeneous Networks. Suddhasil De, Diganta Goswami, Sukumar Nandi |
| 2013 | Fuzzy Approach for Image Near-Duplicate Detection Using Gray Level Vertex Matching in Attribute Relational Bipartite Graphs. Goutam Datta, Bushan L. Raina |
| 2013 | GAS: A Novel Grid Based Authentication System. Narayan Gowraj, Srinivas Avireddy, Sruthi Prabhu |
| 2013 | HASL: High-Speed AUV-Based Silent Localization for Underwater Sensor Networks. Tamoghna Ojha, Sudip Misra |
| 2013 | High Speed Reconfigurable FPGA Based Digital Filter. Navaid Z. Rizvi, Raaziyah Shamim, Rajesh Mishra, Sandeep Sharma |
| 2013 | Hybrid Key Management Technique for WSN's. Ravi Kishore Kodali, Sushant Chougule |
| 2013 | Image Secret Sharing in Stego-Images with Authentication. Amitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar |
| 2013 | Improved Proxy Signature Scheme without Bilinear Pairings. Sahadeo Padhye, Namita Tiwari |
| 2013 | Increasing the Reliability of Fuzzy Angle Oriented Cluster Using Peer-to-Peer. Remani Naga Venkata Jagan Mohan, Vegi Srinivas, Kurra Rajasekhara Rao |
| 2013 | Integrated Approach for Multicast Source Authentication and Congestion Control. Karan Singh, Rama Shankar Yadav |
| 2013 | Key Pre-distribution in a Non-uniform Network Using Combinatorial Design. Sarbari Mitra, Sourav Mukhopadhyay |
| 2013 | Microstrip Patch Antenna Miniaturization Using Planar Metamaterial Unit Cell. Indrasen Singh, Sanjeev Jain, Vijay Shanker Tripathi, Sudarshan Tiwari |
| 2013 | Mobile Based Attendance System in Distributed LAN Server. Ratnesh Prasad Srivastava, Hardwari Lal Mandoria, Rajesh Nautiyal |
| 2013 | Mobility Based Energy Efficient Coverage Hole Maintenance for Wireless Sensor Network. Anil Kumar Sagar, D. K. Lobiyal |
| 2013 | Multiplicative Watermarking of Audio in Spectral Domain. Jyotsna Singh, Parul Garg, Alok Nath De |
| 2013 | NTTM: Novel Transmission Time Based Mechanism to Detect Wormhole Attack. Kumar Chanchal, D. K. Lobiyal |
| 2013 | Network Security Using ECC with Biometric. Dindayal Mahto, Dilip Kumar Yadav |
| 2013 | Network Selection for Remote Healthcare Systems through Mapping between Clinical and Network Parameter. Rajeev Agrawal, Amit Sehgal |
| 2013 | On Generalized Nega-Hadamard Transform. Ankita Chaturvedi, Aditi Kar Gangopadhyay |
| 2013 | On Second-Order Nonlinearities of Two Classes of Cubic Boolean Functions. Deep Singh, Maheshanand Bhaintwal |
| 2013 | Optimal Location and Size of Different Type of Distributed Generation with Voltage Step Constraint and Mixed Load Models. Rajendra P. Payasi, Asheesh Kumar Singh, Devender Singh |
| 2013 | Outlier Detection and Treatment for Lightweight Mobile Ad Hoc Networks. Adarsh Kumar, Krishna Gopal, Alok Aggarwal |
| 2013 | Performance Analysis of Cryptographic Acceleration in Multicore Environment. Yashpal Dutta, Varun Sethi |
| 2013 | Performance Analysis of SMAC Protocol in Wireless Sensor Networks Using Network Simulator (Ns-2). Gayatri Sakya, Vidushi Sharma |
| 2013 | Power Efficient MAC Protocol for Mobile Ad Hoc Networks. Sohan Kumar Yadav, D. K. Lobiyal |
| 2013 | Protecting PLM Data Throughout Their Lifecycle. Rohit Ranchal, Bharat K. Bhargava |
| 2013 | Pruning Search Spaces of RATA Model for the Job-Shop Scheduling. Farid Arfi, Jean-Michel Ilié, Djamel-Eddine Saïdouni |
| 2013 | QoS Support Downlink for WiMAX Network. Pooja Gupta, Brijesh Kumar, Bushan L. Raina |
| 2013 | Quality, Reliability, Security and Robustness in Heterogeneous Networks - 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers Karan Singh, Amit K. Awasthi |
| 2013 | Real Time Object Tracking: Simulation and Implementation on FPGA Based Soft Processor. Manoj Pandey, Dorothi Borgohain, Gargi Baruah, Jagpal Singh Ubhi, Kota Solomon Raju |
| 2013 | Reduced Complexity Pseudo-fractional Adaptive Algorithm with Variable Tap-Length Selection. Asutosh Kar, Mahesh Chandra |
| 2013 | RoboGardner: A Low-Cost System with Automatic Plant Identification Using Markers. Reema Aswani, N. Hema |
| 2013 | Routing Protocols in Mobile Ad-Hoc Network: A Review. Bahuguna Renu, Hardwari Lal Mandoria, Tayal Pranavi |
| 2013 | SEP-E (RCH): Enhanced Stable Election Protocol Based on Redundant Cluster Head Selection for HWSNs. Raju Pal, Ritu Sindhu, Ajay K. Sharma |
| 2013 | Safety Analysis of Automatic Door Operation for Metro Train: A Case Study. Ajeet Kumar Pandey, Srinivas Panchangam, Jessy George Smith |
| 2013 | Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA. Rajesh Duvvuru, Sunil Kumar Singh, Gudikhandula Narasimha Rao, Ashok Kote, Bangaru Bala Krishna, Moturu Vijaya Raju |
| 2013 | Secret Image Sharing Scheme Based on Pixel Replacement. Tapasi Bhattacharjee, Jyoti Prakash Singh |
| 2013 | Secure Real Time Scheduling on Cluster with Energy Minimization. Rudra Pratap Ojha, Rama Shankar Yadav, Sarsij Tripathi |
| 2013 | Security Improvement in Group Key Management. Manisha Manjul, Rakesh Kumar, Rajesh Mishra |
| 2013 | Simplified Control Algorithm Based on IRP Theory for Three Phase Shunt Active Power Filter. Ajay Kumar Maurya, Yogesh Kumar Chauhan |
| 2013 | Simulation and Modeling of a Constant Voltage Controller Based Solar Powered Water Pumping System. Bhavnesh Kumar, Yogesh Kumar Chauhan, Vivek Shrivastava |
| 2013 | The Outage Analysis of Inter-relay Coded Cooperation over Nakagami-m Fading Channels. Prabhat Kumar Sharma, Parul Garg |
| 2013 | Threats and Challenges to Security of Electronic Health Records. Shalini Bhartiya, Deepti Mehrotra |
| 2013 | Trust Management Method for Vehicular Ad Hoc Networks. Riaz Ahmed Shaikh, Ahmed Saeed Alzahrani |
| 2013 | WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. Xinxin Fan, Kalikinkar Mandal, Guang Gong |
| 2013 | Wavelet Analysis of Electrical Signals from Brain: The Electroencephalogram. Rohtash Dhiman, Priyanka, Jasbir Singh Saini |
| 2013 | Wireless Sensor Node Placement Due to Power Loss Effects from Surrounding Vegetation. Babu Sean Paul, Suvendi Rimer |