Super User
14 November 2011
A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes
Thulasimani
Published in
Vol 9, No. 3, May 2012
14 November 2011
Representing Access Control Policies in Use Cases
Khaled Alghathbar
College of
College of
Published in
Vol 9, No. 3, May 2012
14 November 2011
A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography
Published in
Vol 9, No. 3, May 2012
14 November 2011
An Integrated Radix-4 Modular Divider/Multiplier Hardware Architecture for Cryptographic Applications
Lo&
Published in
Vol 9, No. 3, May 2012
15 November 2011
Reliable Broadcasting Using Efficient Forward Node Selection for Mobile Adhoc Networks
Govindaswamy
Published in
Vol 9, No. 4, July 2012
15 November 2011
Training of Fuzzy Neural Networks via Quantum-Behaved Particle Swarm Optimization and Rival Penalized Competitive Learning
<
Published in
Vol 9, No. 4, July 2012
15 November 2011
The Effect of Using P-XCAST Routing Protocol on Many-to-Many Applications
Faisal
Published in
Vol 9, No. 4, July 2012
15 November 2011
Automatic Plagiarism Detection using Similarity Analysis
Shanmugasundaram Hariharan
Department of Information
Department of Information
Published in
Vol 9, No. 4, July 2012
15 November 2011
A Hybrid Approach for Modeling
Financial Time Series
Alina Barbulescu and
Published in
Vol 9, No. 4, July 2012
15 November 2011
Intrinsic Authentication of Multimedia Objects Using Biometric Data Manipulation
Maqsood Mahmud1, 2, 3, Muhammad
Published in
Vol 9, No. 4, July 2012