Super User

A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes

Thulasimani
Written by

Representing Access Control Policies in Use Cases

Khaled Alghathbar
College of
Written by

A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography

Written by

An Integrated Radix-4 Modular Divider/Multiplier Hardware Architecture for Cryptographic Applications

Lo&
Written by

Reliable Broadcasting Using Efficient Forward Node Selection for Mobile Adhoc Networks

Govindaswamy
Written by

Training of Fuzzy Neural Networks via Quantum-Behaved Particle Swarm Optimization and Rival Penalized Competitive Learning

<
Written by

The Effect of Using P-XCAST Routing Protocol on Many-to-Many Applications

Faisal
Written by

Automatic Plagiarism Detection using Similarity Analysis

Shanmugasundaram Hariharan
Department of Information
Written by

A Hybrid Approach for Modeling
Financial Time Series

Alina Barbulescu and
Written by

Intrinsic Authentication of Multimedia Objects Using Biometric Data Manipulation

Maqsood Mahmud1, 2, 3, Muhammad
Written by
Page 49 of 170
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…