Published: 2014-03-26
Articles
Data Confidentiality in Cloud Computing with Blowfish Algorithm
Read Statistic: 123
Malicious Agent Detection In Multi Party Data Access Structure
Read Statistic: 49
Image Morphing with Data Security
Read Statistic: 42
Security to Anonymous Network
Read Statistic: 44
The Case Study of Optimization of DG System in Jamnagar District
Read Statistic: 44
Handwritten Pattern Recognition-A Survey
Read Statistic: 122
Android App for Local Railway Ticketing Using GPS Validation
Read Statistic: 100