Vol 2, No 12 (2010)

Table of Contents

Vol 2, No 12 (2010)

Open Access Open Access  Restricted Access Subscription Access

Articles

Image Change Detection for Differently Exposed Image Pairs
D. Beulah David, M. A. Dorai Rangaswamy, M. Ramalatha Marimuthu
 Vol 2, No 12 (2010), Pagination: 
ABSTRACT |  PDF     Abstract Views: 146  |  PDF Views: 3
A Novel Mutual Authentication Scheme Using Non-Expansion Visual Cryptography in Reversible Style
B. Padhmavathi, P. Nirmal Kumar, M. A. Dorai Rangaswamy
 Vol 2, No 12 (2010), Pagination: 
ABSTRACT |  PDF     Abstract Views: 191  |  PDF Views: 3
A Fast Positive Approach of P-DPL in the Packet Inspection
N. Kannaiya Raja, K. Arulanandam, G. Deepa, M. Balaji
 Vol 2, No 12 (2010), Pagination: 
ABSTRACT |  PDF     Abstract Views: 305  |  PDF Views: 4
Mobile Robot Authentication System Using Finger Print Matching
S. Tamil Mani, S. Venkatta Priya
 Vol 2, No 12 (2010), Pagination: 
ABSTRACT |  PDF     Abstract Views: 169  |  PDF Views: 3
A Detailed Study on Cloud Computing Based on Security and Future Opportunities
A. Rajadurai, J. Ilanchezhian, V. Varadharassu, A. Ranjeeth
 Vol 2, No 12 (2010), Pagination: 
ABSTRACT |  PDF     Abstract Views: 318  |  PDF Views: 3