Published: 2014-03-26
Articles
Data Confidentiality in Cloud Computing with Blowfish Algorithm
Read Statistic: 127
Malicious Agent Detection In Multi Party Data Access Structure
Read Statistic: 53
Image Morphing with Data Security
Read Statistic: 46
Security to Anonymous Network
Read Statistic: 48
The Case Study of Optimization of DG System in Jamnagar District
Read Statistic: 48
Handwritten Pattern Recognition-A Survey
Read Statistic: 126
Android App for Local Railway Ticketing Using GPS Validation
Read Statistic: 104