Published: 2014-03-26
Articles
Data Confidentiality in Cloud Computing with Blowfish Algorithm
Read Statistic: 140
Malicious Agent Detection In Multi Party Data Access Structure
Read Statistic: 65
Image Morphing with Data Security
Read Statistic: 58
Security to Anonymous Network
Read Statistic: 62
The Case Study of Optimization of DG System in Jamnagar District
Read Statistic: 61
Handwritten Pattern Recognition-A Survey
Read Statistic: 137
Android App for Local Railway Ticketing Using GPS Validation
Read Statistic: 118