Table of Contents
Vol 3, No 2 (2015)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Articles
Secure Watermarking using Diophantine Equations for Authentication and Recovery | ||
Jayashree Nair, T. Padma | ||
Vol 3, No 2 (2015), Pagination: 1-9 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 231 | PDF Views: 0 |
Application of Quaternion Numbers in Identification Scheme | ||
Reza Alimoradi | ||
Vol 3, No 2 (2015), Pagination: 17-20 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 241 | PDF Views: 0 |
Mitigating Virtual Machine Denial of Service Attacks from Mobile APPS | ||
Dennis Guster, Abdul Raqeeb, Erich Rice | ||
Vol 3, No 2 (2015), Pagination: 21-31 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 197 | PDF Views: 0 |
Restricted Constraints in the Problem of Maximum Attainable Flow in Minimum Cost in a Network | ||
Nazimuddin Ahmed, Shobha Duttadeka | ||
Vol 3, No 2 (2015), Pagination: 32-50 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 209 | PDF Views: 0 |