Published: 2014-03-26
Articles
Data Confidentiality in Cloud Computing with Blowfish Algorithm
Read Statistic: 132
Malicious Agent Detection In Multi Party Data Access Structure
Read Statistic: 58
Image Morphing with Data Security
Read Statistic: 50
Security to Anonymous Network
Read Statistic: 52
The Case Study of Optimization of DG System in Jamnagar District
Read Statistic: 53
Handwritten Pattern Recognition-A Survey
Read Statistic: 132
Android App for Local Railway Ticketing Using GPS Validation
Read Statistic: 109