How Good is the DES Algorithm in Image Ciphering? |
Said F. El-Zoghdy, Yasser A. Nada, A. A. Abdo |
Vol 2, No 5 (2011), Pagination: 796-803
|
ABSTRACT |
PDF
|
|
Abstract Views: 151 |
PDF Views: 0
|
Heuristic Task Allocation Strategies for Computational Grid |
Ashish V. Chandak, Bibhudatta Sahoo, Ashok Kumar Turuk |
Vol 2, No 5 (2011), Pagination: 804-810
|
ABSTRACT |
PDF
|
|
Abstract Views: 140 |
PDF Views: 0
|
Attacking Embedded Systems Through Power Analysis |
JKR. Sastry, K. Subba Rao, N. Venkata Ram, J. Sasi Bhanu |
Vol 2, No 5 (2011), Pagination: 811-816
|
ABSTRACT |
PDF
|
|
Abstract Views: 164 |
PDF Views: 0
|
Analysis of Users Web Browsing Behavior Using Markov Chain Model |
Diwakar Shukla, Rahul Singhai |
Vol 2, No 5 (2011), Pagination: 824-830
|
ABSTRACT |
PDF
|
|
Abstract Views: 160 |
PDF Views: 0
|
Novel Mobile Network Service for Road Safety |
J. Radhakrishnan, R. S. Rajesh |
Vol 2, No 5 (2011), Pagination: 831-840
|
ABSTRACT |
PDF
|
|
Abstract Views: 147 |
PDF Views: 0
|
An Authenticated Transmission of Medical Image with Codebase Cryptosystem Over Noisy Channel |
Deo Brat Ojha, Ajay Sharma, Abhishek Dwivedi, Nitin Pandey, Amit Kumar |
Vol 2, No 5 (2011), Pagination: 841-845
|
ABSTRACT |
PDF
|
|
Abstract Views: 170 |
PDF Views: 0
|
Watermarking Algorithm Using Sobel Edge Detection |
P. Ramesh Kumar, K. L. Sailaja |
Vol 2, No 5 (2011), Pagination: 861-867
|
ABSTRACT |
PDF
|
|
Abstract Views: 160 |
PDF Views: 0
|
Implementation of LSB Steganography and its Evaluation for Various File Formats |
V. Lokeswara Reddy, A. Subramanyam, P. Chenna Reddy |
Vol 2, No 5 (2011), Pagination: 868-872
|
ABSTRACT |
PDF
|
|
Abstract Views: 157 |
PDF Views: 0
|
An Efficient Morphological Salt-and-Pepper Noise Detector |
Alok Singh, Umesh Ghanekar, Chakresh Kumar, Ghanendra Kumar |
Vol 2, No 5 (2011), Pagination: 873-875
|
ABSTRACT |
PDF
|
|
Abstract Views: 155 |
PDF Views: 0
|