×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
ijsptm documents
Documents
Hash Based Least Significant Bit Technique for Video Steganography(HLSB)
Documents
Credit Card Fraud Detection Based on Ontology Graph
Technology
The relationship between organizational space of offices and corporate identity (case study general offices in azerbaijan)
Technology
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
Technology
A novel secure image steganography method based on chaos theory in spatial domain
Technology
Security system with face recognition, sms alert and embedded network video monitoring terminal
Technology
Malicious pdf document detection based on feature extraction and entropy
Technology
Error performance of jpeg and watermark
Technology
The conceptual idea of online social media
Technology
Performance Evaluation of Message Security Using Fractal Sieve with MMD
Technology
Analysis and improvement of pairing free certificate-less two-party authenticated key agreement protocol for grid computing
Technology
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense Mobile Ad Hoc Networks
Technology
AN EVALUATION OF ENERGY EFFICIENT SOURCE AUTHENTICATION METHODS FOR FALSE DATA FILTERING IN WSN
Technology
MANAGING THE INTERTWINING AMONG USERS, ROLES, PERMISSIONS, AND USER RELATIONSHIPS IN AN INFORMATION FLOW CONTROL MODEL
Technology
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIOR
Technology
A novel multifactor authentication system ensuring usability and security
Technology
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
Documents
IJSPTM 010602
Technology
Towards Pervasive Computing Environments With Cloud Services
Technology
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Networks Using Trigger Identification Service
Technology
Cloud computing technology security and trust challenges
Next >