Table of Contents
Vol 3, No 2 (2015)
Open Access
Subscription Access
Articles
Secure Watermarking using Diophantine Equations for Authentication and Recovery | ||
Jayashree Nair, T. Padma | ||
Vol 3, No 2 (2015), Pagination: 1-9 | ||
ABSTRACT | PDF | Abstract Views: 265 | PDF Views: 0 |
Application of Quaternion Numbers in Identification Scheme | ||
Reza Alimoradi | ||
Vol 3, No 2 (2015), Pagination: 17-20 | ||
ABSTRACT | PDF | Abstract Views: 275 | PDF Views: 0 |
Mitigating Virtual Machine Denial of Service Attacks from Mobile APPS | ||
Dennis Guster, Abdul Raqeeb, Erich Rice | ||
Vol 3, No 2 (2015), Pagination: 21-31 | ||
ABSTRACT | PDF | Abstract Views: 236 | PDF Views: 0 |
Restricted Constraints in the Problem of Maximum Attainable Flow in Minimum Cost in a Network | ||
Nazimuddin Ahmed, Shobha Duttadeka | ||
Vol 3, No 2 (2015), Pagination: 32-50 | ||
ABSTRACT | PDF | Abstract Views: 242 | PDF Views: 0 |