Subscribe Now Subscribe Today
Science Alert Home Journals at Science Alert For Authors For Subscribers Contact Us
 
FOLLOW US:     Facebook    Twitter
   
 
    Publisher: Academic Journals Inc., USA
   
  Research Journal of Information Technology is positioned to publish high quality research papers that reflect global information technology advances. Scope of the journal includes: Strategy, change, infrastructure, human resources, sourcing, system development and implementation, communications, technology developments, technology futures, national policies and standards.

Research Journal of Information Technology now accepting new submissions. Submit your best paper via online submission system.
  Editor-in-Chief:  David Chek Ling Ngo
 
 
Brindha, N., S. Karthikeyan and N. Lalitha, 2007. A comparative study between Business Process Outsourcing (BPO) and Knowledge Process Outsourcing (KPO). J. Manage., 2: 584-592.
Hemalatha, M., V.V. Gomathi and S. Karthikeyan, 2006. An efficient algorithm for predicting survival of medical data. Int. J. Technol. Knowledge Soc., 2: 37-48.
Direct Link  |  
Karthikeyan, S. and E. Ramaraj, 2006. A design of enhanced security protocol for wireless communication using hybrid encryption technique (AES-rijndael and RSA). Indian J. Comput. Technol., 1: 22-29.
Karthikeyan, S. and E. Ramaraj, 2006. A new type of network security protocol using hybrid encryption in virtual private networking. J. Comput. Sci., 2: 672-675.
CrossRef  |  Direct Link  |  
Karthikeyan, S., 2008. An extended MD5 (ExMD5) algorithm for better data integrity. J. Comput. Sci., 2: 584-592.
Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2005. An improvement of security of 802.22 using hybrid encryption (AES-rijndael and RSA). J. Inform. Sci. Technol., 1: 18-26.
Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. A new approach of hybrid encryption technique in database security. Int. J. Technol. Knowledge Soc., 2: 55-60.
Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. An improvement of Eun-jun-kyung-kee`s remote user authentication scheme in smart card using hybrid encryption. J. Comput. Sci., 1: 293-300.
Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2009. A design of security protocol using hybrid encryption technique (AES-rijndael and RSA). Int. J. Comput. Internet Manage., 17: 78-86.
Direct Link  |  
Karthikeyan, S., E. Ramaraj and N. Lalitha, 2006. An analysis of key management in transport layer security standard. PCTE J. Comput. Sci., 2: 78-84.
Karthikeyan, S., E. Ramaraj and N. Lalitha, 2006. The new approach of secure protocol in smart card using hybrid encryption technique. ICFAI J. Syst. Manage., 2: 71-75.
Karthikeyan, S., E. Ramaraj and N. Lalitha, 2007. An analysis and improvement of security in wired equivalent privacy (WEP) algorithm using hybrid encryption technique. Int. J. Comput. Sci. Syst. Anal., 1: 75-81.
Karthikeyan, S., M. Hemalatha and E. Ramaraj, 2005. Database search and retrieval system for bacteria. Bioinformatics India J., 3: 37-42.
Karthikeyan, S., M. Hemalatha and V.V. Gomathi, 2005. A data-mining tool to increase human life days from affecting cardiac arrest. Bioinformatics India J., 3: 96-111.
Karthikeyan, S., M. Hemalatha and V.V. Gomathi, 2008. Data mining–knowledge discovery database. Tamil Comput. Magazine, 12: 4-8.
Nagarajan, M. and S. Karthikeyan, 2009. Health condition observation in high level efficiency using an advanced sensor network. CIIT Int. J. Wireless Commun., 1: 183-189.
Direct Link  |  
Ramaraj, A., N. Laitha and S. Karthikeyan, 2006. An analysis of key management in cryptographic algorithms. Asia J. Inform. Technol., 5: 963-967.
CrossRef  |  Direct Link  |  
Shanmugavel, D.P., 2006. Trends in Bioinformatics. In: Microarray in Bioinformatics , Hemalatha, M. and S. Karthikeyan (Eds.). Pointer publishers, Jaipur, India, pp: 212-250.

 
 
 
 
 
 
 
 
 

 
 
 
 
 
 

                 home       |       journals        |       for authors       |       for subscribers       |       asci
          © Science Alert. All Rights Reserved